Vertical Industries  >  

Financial Industry

RSS Feed    Add to Google    Add to My Yahoo!
Financial IndustryReports
 
Top Monitoring Tools to Help Meet Regulatory Compliance Standards
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

SearchSecurity.com

Leverage Security Intelligence For Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

How to Leverage Desktop Virtualization in the Financial Industry
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper details a few scenarios in which VDI is best suited to meet the special requirements and budgetary constraints of datacenters that support financial service companies.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Dell, Inc.

Financial services must gain speed and go mobile to satisfy customers
sponsored by ComputerWeekly.com
WHITE PAPER: This nine-page Buyer’s Guide to Financial Services IT assesses the implications and challenges facing CIOs and senior IT professionals.
Posted: 21 Oct 2011 | Published: 19 Jan 2011

ComputerWeekly.com

Leading Insurance, Financial and Banking Services Provider Replaces Citrix with Ericom's Server Based Computing Solution
sponsored by Ericom Software
CASE STUDY: Western Financial group was facing a challenge to provide insurance brokers with remote access from the organization's core insurance application running on Windows terminal Servers, so to overcome this issue they moved on to Ericom.
Posted: 10 May 2008 | Published: 01 Jan 2007

Ericom Software

Paving the Way for Business Innovation with Integrated Business Communications
sponsored by IBM Software Group
WHITE PAPER: This paper provides an overview of opportunities and benefits and includes two "before and after" scenarios -- one in financial services and one in healthcare -- that demonstrate how IBM clients have benefited from integrated business communications.
Posted: 20 Jun 2007 | Published: 01 Jan 2007

IBM Software Group

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement