IT Systems  >   Business Systems  >   Financial Systems  >  

EFT

RSS Feed    Add to Google    Add to My Yahoo!
EFT Reports
 
Workplace Forms & IBM DB2 Content Manager Demo
sponsored by IBM Software Group
PRESENTATION: See how a bank completes an online wire transfer using the document management strengths of IBM DB2 Content Manager and the electronic forms capability of IBM Workplace Forms.
Posted: 20 Jun 2007 | Published: 01 Jun 2007

IBM Software Group

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017


Parsing a SWIFT Message
sponsored by IONA Technologies
WHITE PAPER: This white paper will take you through a real life example of how to parse, validate and test a 5-part SWIFT message. Discover a tool that can speed up this lengthy process with source code that parses, validates and provides full APIs.
Posted: 03 Oct 2007 | Published: 01 May 2007

IONA Technologies

How Effective is Your AML Auditing?
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.
Posted: 02 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Improve Customer Service and IT Service Support via Cognitive Computing
sponsored by IBM
VIDEO: Delve into the thickets of your multi-vendor IT landscape, and discover how to easily and quickly resolve your IT support problems in order to get your systems back online with cognitive computing. Tune in now to revamp your customer support with an automated technology support service.
Posted: 29 Mar 2017 | Premiered: 28 Jul 2016

IBM

How to Get the Best from VMware Workloads with Hybrid Cloud
sponsored by IBM
WHITE PAPER: Discover how to extend VMware workloads from on-premises environments to the cloud with on-demand bare metal and virtual servers—security and compliance intact. Read on to transition to hybrid cloud with minimal disruption, and maintain control of your apps.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

IBM

Fighting the Latest Evolution of Money Laundering
sponsored by BAE Systems
WHITE PAPER: This report explores how to meet the ever-growing threat of financial cybercrime. Discover how to take an integrated approach to detecting and preventing cybercrime that leverages anti-money laundering (AML) technologies, blockchains, machine learning, and more.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

BAE Systems

6 Steps to Proactive Cybersecurity Protection
sponsored by BAE Systems
WHITE PAPER: Learn how to take a stratified approach to IT security that leverages threat intelligence to prevent breaches. Discover 6 steps to proactive cybersecurity protection and obtain the monitoring capabilities you're looking for.
Posted: 07 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Financial Crime Survey: Prioritizing Compliance, AML, and Fraud Detection
sponsored by BAE Systems
RESEARCH CONTENT: Investment in financial crime defenses is increasing, most significantly in AML and non-AML compliance. Access this financial crime survey report to discover how financial crime prevention priorities are shifting and why the move to consolidation between fraud and compliance solutions is leading the trend.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

BAE Systems

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
EFT White Papers | EFT Multimedia | EFT IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement