Vertical Industries  >   Financial Services Industry  >  

Credit Unions

RSS Feed    Add to Google    Add to My Yahoo!
Credit UnionsReports
 
Rising security concern for online and mobile banking
sponsored by HID
RESOURCE: This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014

HID

Case Study: Automatic Documentation of All Business Processes in a Single Platform
sponsored by Automic
CASE STUDY: In this case study, discover how Postbank, a private German bank, was able to automate documentation of all business processes in a single platform. Discover the platform they deployed to ensure the reliability and security that are essential to their daily operations.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Automic

The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Rabobank International Enabling Customers to Bank Safe with HP
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one bank refocused their security energy towards data protection and customer experience management.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

10 Questions to Ask Before Buying an Optimization Solution
sponsored by FICO
WHITE PAPER: This paper outlines the 10 questions you should ask to help you understand the requirements – and avoid the pitfalls – of decision optimization. Read more about the lessons learned from FICO’s extensive work with clients successfully using optimization today.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

FICO

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

The Rise, Fall and Rise of Branch Banking
sponsored by IBM
WHITE PAPER: If you want to see bottom line results then reinvigorate by optimizing information assets and business processes across your enterprise.
Posted: 17 Mar 2008 | Published: 13 Mar 2008

IBM

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Get the Facts on Information Availability: Essential Data Protection, Recovery and Resiliency for Banks
sponsored by Vision Solutions
WHITE PAPER: The power of an information availability solution lies in its ability to transform any nonproductive, non-profitable downtime into the optimum level of value-producing business uptime.
Posted: 09 May 2008 | Published: 01 Jan 2007

Vision Solutions

Managing 21st Century Business and Technology Innovation: Core Banking Transformation with System z
sponsored by IBM
WHITE PAPER: This paper provides practical insights into global best practices and the strategic benefits of core banking transformation through the lens of the CEO, COO and CIO.
Posted: 14 May 2008 | Published: 01 Oct 2007

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement