Vertical Industries  >  

Investment Management Industry

RSS Feed    Add to Google    Add to My Yahoo!
Investment Management Industry Reports
 
MiFID II is on the horizon. Are you ready?
sponsored by Smarsh
WHITE PAPER: This white paper outlines how IT teams can ensure compliance for the revised Markets in Financial Instruments Directive (MiFID II) during archiving, most notably, with the need to record, store, and reproduce all transaction-related communications. Read on to find out more.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Smarsh

Cash Management in the Digital Age, Podcast Part 2
sponsored by Dell EMC, Axxiome & Intel®
PODCAST: In this podcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management, as well as how SAP HANA appliances accelerate the analysis of cash management information.
Posted: 01 Aug 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age
sponsored by Dell EMC, Axxiome & Intel®
WHITE PAPER: Commercial lines of business have yet to fully capitalize on cash management services as a potential revenue stream. Discover how to drive visibility into cash management data with Axxiome's Cash Management Cockpit, built on the in-memory, real-time, cloud-compatible capabilities of SAP HANA.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age Podcast
sponsored by Dell EMC, Axxiome & Intel®
PODCAST: In this podcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management for the modern financial technology landscape in conjunction with SAP environments.
Posted: 31 Jul 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Product Overview: Axxiome Cash Management
sponsored by Dell EMC, Axxiome & Intel®
PRODUCT OVERVIEW: Banks serving commercial customers in the digital age are challenged to manage relationships that are complex and diverse. A tool can help deliver insights and mediate commercial cash management issues. Learn about Axxiome Cash Management Cockpit, and how it can help you support your customer relationships.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Dell EMC, Axxiome & Intel®

Key Drivers for Adopting SaaS Financial Applications
sponsored by SearchHRSoftware
EGUIDE: Read this e-guide to learn about today's key drivers for SaaS financial applications adoption, as well as what's currently available when it comes to selecting your cloud provider.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

SearchHRSoftware

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

Demystifying Customer Service Correspondence Work Flow in Cards
sponsored by Wipro Technologies
WHITE PAPER: Methods for capturing customer attention and loyalty may have changed over the years, but the basic DNA of business has not - a focus on establishing new customer relationships and retaining existing ones. This paper provides both a business & technology insight into the credit card customer service workflow.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro Technologies

Best Practices for Provisioning Databases for Test and Development
sponsored by Informatica
WHITE PAPER: Best practices and new technologies available for provisioning databases for test and development environments are outlined in this white paper. Using this as a guide, organizations can save time and resources, meet regulatory compliance standards, and streamline database provisioning processes for test and development environments.
Posted: 01 Apr 2009 | Published: 16 Jan 2009

Informatica

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement