Vertical Industries  >  

Financial Services and Insurance Industry

RSS Feed    Add to Google    Add to My Yahoo!
Financial Services and Insurance IndustryReports
 
Mutual Fund Giant Securely Encrypts Multiple Customer Applications in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features a Boston-based investment services company, and reveals how they made the switch to cloud applications successfully.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Preparing for the Capital Requirements Directive
sponsored by ComputerWeekly.com
ANALYST REPORT: Just how prepared were the financial markets across Europe for CRD IV and XBRL?
Posted: 17 Apr 2013 | Published: 17 Apr 2013

ComputerWeekly.com

Leading Insurance, Financial and Banking Services Provider Replaces Citrix with Ericom's Server Based Computing Solution
sponsored by Ericom Software
CASE STUDY: Western Financial group was facing a challenge to provide insurance brokers with remote access from the organization's core insurance application running on Windows terminal Servers, so to overcome this issue they moved on to Ericom.
Posted: 10 May 2008 | Published: 01 Jan 2007

Ericom Software

Tailoring Performance Management to Your Organization - Best Practices eBook
sponsored by Actuate
BOOK: Organizations need to adopt best practices and avoid common traps in order to implement a leading-edge Strategic Performance Management approach.
Posted: 07 Jan 2008 | Published: 01 Jan 2007

Actuate

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing

ebizQ.net Tip Guide: Evolving your dynamic case management strategy
sponsored by IBM
EGUIDE: This Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

IBM

Leveraging XBRL for Value in Organizations
sponsored by ISACA
WHITE PAPER: This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

ISACA

Top Information Leakage Threats Facing Today's Financial Service Industry
sponsored by Vericept Corporation
WHITE PAPER: This white paper shows how content-aware risk management systems combat information leakage through a combination of detection methods including data-matching, database-matching and linguistic analysis.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Vericept Corporation

How to make technology a catalyst for high performance finance
sponsored by Infor
WHITE PAPER: Check out this white paper to examine the forces of today that are converging to change the role of the finance and explore how technology is providing new ways to solve old problems.
Posted: 09 Jul 2013 | Published: 09 Jul 2013

Infor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement