Vertical Industries  >   Financial Services Industry  >  

Real Estate Lending

RSS Feed    Add to Google    Add to My Yahoo!
Real Estate Lending White Papers (View All Report Types)
 
Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Data Consolidation and Multi-Tenancy in Financial Services
sponsored by Cloudera
WHITE PAPER: Find out why the idea of applying a data hub strategy to the enterprise architecture so enticing to financial services firms.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cloudera

A Leap Forward for Retail Banking
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief resource to learn about the evolution of retail bank branches, and why automation, speed, and security are critical factors in improving customer relationships and driving sales.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Hewlett-Packard Company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Paving the Way for Business Innovation with Integrated Business Communications
sponsored by IBM Software Group
WHITE PAPER: This paper provides an overview of opportunities and benefits and includes two "before and after" scenarios -- one in financial services and one in healthcare -- that demonstrate how IBM clients have benefited from integrated business communications.
Posted: 20 Jun 2007 | Published: 01 Jan 2007

IBM Software Group

Building a Clear and Socially Connected Enterprise
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn how financial services firms can leverage social channels to better understand changing customer needs and interaction styles, develop products and services that address those changes, and create marketing campaigns that target these customers.
Posted: 27 Mar 2012 | Published: 31 Dec 2010

SAP America, Inc.

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Dark Pools of Liquidity: Understanding & Technology dependencies for the future
sponsored by Wipro Technologies
WHITE PAPER: This white paper provides insight into the dark pools of liquidity, discusses the mechanism of dark pools trading, advantages and how technology would impact the operations or provide benefits in trading over this medium.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro Technologies

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement