Vertical Industries  >   Financial Services Industry  >  

Loan Brokerages

RSS Feed    Add to Google    Add to My Yahoo!
Loan Brokerages Reports
 
Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Case Study: Mortgage Lender Efficiently Evaluates Corporate Performance
sponsored by TIBCO Software Inc.
CASE STUDY: A retail mortgage lender needed to combat data silos to gain up-to-date information on key performance metrics. Explore how they were able to efficiently define, deploy, and maintain reports on corporate performance, leading to better-informed decisions and plans.
Posted: 06 Apr 2016 | Published: 31 Dec 2011

TIBCO Software Inc.

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by SearchSecurity.com
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Fine-Tune Money Laundering Detection Tools with Analytics, Machine Learning
sponsored by BAE Systems
WHITE PAPER: Discover how to improve money laundering detection with analytics and machine-learning that can help you fine-tune anti-money laundering (AML) tools and test, simulate, and export AML models.
Posted: 28 Feb 2017 | Published: 03 Jan 2017

BAE Systems

RBC Implements Virtual Agents to Improve Online Customer Experiences
sponsored by [24]7
CASE STUDY: RBC, a large financial services institution, wanted to improve customer relations while reducing the number of calls coming into its contact centers. Access this case study to learn how they implemented virtual agents across their banking, direct investing, and insurance websites to enhance the customer experience and improve their bottom line.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

[24]7

How Effective is Your AML Auditing?
sponsored by BAE Systems
WHITE PAPER: This white paper explores how to implement strong, comprehensive anti-money laundering (AML) audit processes to help you identify and prevent financial threats. Discover what defines an effective AML audit model, how to prep your AML audit, how to overcome AML audit challenges, and more.
Posted: 02 Mar 2017 | Published: 31 Dec 2016

BAE Systems

Computer Weekly – 29 October 2013: Innovation in banking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to leading European banks to find out how they are using technology to build a closer rapport with customers. We ask whether Microsoft's Windows Server is now ready to rival VMware for hybrid cloud projects. And we assess the emerging leaders in the flash storage market. Read the issue now.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

ComputerWeekly.com

Six tips for getting the most out of SAP Workflow
sponsored by Dolphin
EGUIDE: View this expert E-guide to learn more about how you can implement SAP Workflow in your organization. Discover how a properly designed SAP workflow will help your business with automated routine financial processes with areas like asset accounting and auditing.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

Dolphin

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement