Vertical Industries  >  

Investment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Investment Industry Reports
 
Unlocking Data to Transform Financial Services
sponsored by MuleSoft
WHITE PAPER: Access this white paper to learn more about how businesses in the financial services industry can get the most out of their data management system.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

MuleSoft

Financial Services and Digital Media: How Your Business Can Adapt to Digital Innovations
sponsored by MuleSoft
WHITE PAPER: There is a greater push for you to deliver a highly personalized and convenient experience that stretches across mobile, social and alternative delivery channels. Access this resource to learn how you can leverage APIs, embrace app modernization, and adopt "bimodal" approaches to enhance the customer experience across multiple touch points.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

MuleSoft

Financial Services Report: Reshaping ICT, Reshaping Business
sponsored by ComputerWeekly.com
IT BRIEFING: This report from Fujtsu assesses the IT trends and prioirties in the financial services industry.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency
sponsored by Sterling Commerce, An IBM Company
WHITE PAPER: This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units.
Posted: 11 Sep 2009 | Published: 01 Sep 2009

Sterling Commerce, An IBM Company

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.”
Posted: 21 Dec 2010 | Premiered: Feb 23, 2011, 11:00 EST (16:00 GMT)

Oracle Corporation

Capturing a Competitive Advantage with a Secure Payments Infrastructure
sponsored by Intel
WHITE PAPER: A number of factors are driving financial institutions to re-evaluate their payment methods.  These factors include regulations such as Single Euro Payments Area in Europe, which calls for new payment vehicles for customers. Find out how one financial institution was able to meet compliance demands by utilizing a secure payments infrastructure.
Posted: 05 May 2011 | Published: 05 May 2011

Intel

The Seven MegaTrends of Professional Services: The Forces That Are Transforming Professional Services Industries and How to Respond
sponsored by Epicor Software Corporation
WHITE PAPER: In this paper we will study the seven MegaTrends of professional services that will provide us with a sound foundation for responding strategically, and taking advantage of these fundamental changes.
Posted: 03 Oct 2005 | Published: 01 Sep 2005

Epicor Software Corporation

Best Practices for Provisioning Databases for Test and Development
sponsored by Informatica
WHITE PAPER: Best practices and new technologies available for provisioning databases for test and development environments are outlined in this white paper. Using this as a guide, organizations can save time and resources, meet regulatory compliance standards, and streamline database provisioning processes for test and development environments.
Posted: 01 Apr 2009 | Published: 16 Jan 2009

Informatica

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement