Business of Information Technology  >   Business Management  >   Financial Management  >  

Basel Capital Accord

RSS Feed    Add to Google    Add to My Yahoo!
Basel Capital Accord Reports
 
Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

Cisco Storage Media Encryption: Meeting the Security Challenge
sponsored by Cisco Systems, Inc.
BROCHURE: This white paper is an introduction to Cisco Storage Media Encryption (SME), a heterogeneous, standards-based encryption solution for data at rest with comprehensive built-in key-management features.
Posted: 04 Nov 2008 | Published: 04 Nov 2008

Cisco Systems, Inc.

AP Automation – Making it Happen
sponsored by Kofax from Lexmark
WHITE PAPER: When you get the opportunity to pitch an AP Automation initiative, you need to be ready to overcome some CFO opposition. This e-book will help you win over your CFO.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Kofax from Lexmark

Financial Services: Risk Management
sponsored by Red Hat
WHITE PAPER: Risk in the financial services industry has emerged as a key factor in competitiveness, reputation, management, and regulatory compliance. Read this technology overview to learn about a cloud-ready and cost-effective solution to help you manage risk.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Red Hat

Centuries Young Bank Readies for Another Century of Progress
sponsored by Alcatel-Lucent
CASE STUDY: This case study follows how one bank adopted a cloud network while maintaining security and compliance.
Posted: 08 Aug 2015 | Published: 08 Aug 2015

Alcatel-Lucent

Workplace Mobility, Consumerization, and Alternative IT Strategy Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: Access this white paper to learn how to build a desktop transformation strategy that incorporates six application desktop delivery models, endpoint choice, and a safe and secure environment for IT.
Posted: 30 Jun 2015 | Published: 31 Dec 2013

VMware

Data Governance and Maintenance for Financial Institution Monitors
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores a data gathering and organizing strategy to keep up with government monitors. Read on to learn how to ensure maintenance of enterprise governance and risk controls throughout the investigation process.
Posted: 18 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

How to Kill Agility
sponsored by Rally Software
WHITE PAPER: This white paper highlights the nine mistakes organizations make involving agile measurement at enterprise scale—and how to do it right.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Rally Software

Automate to Innovate: Accelerate Releases with Application Release Automation
sponsored by Automic
WHITE PAPER: Read this this white paper to learn how ARA optimized for enterprise environments ensures quality releases and minimizes downtime to help development and operations enable business growth.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Automic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement