Loan Agencies Reports

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

Six tips for getting the most out of SAP Workflow
sponsored by Dolphin
EGUIDE: View this expert E-guide to learn more about how you can implement SAP Workflow in your organization. Discover how a properly designed SAP workflow will help your business with automated routine financial processes with areas like asset accounting and auditing.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

Dolphin

Streamlined corporate payment systems: Increase flexibility, save time and money
sponsored by IBM
WHITE PAPER: This white paper explores how business process management (BPM) can be used to streamline corporate payment operations for increased customer satisfaction and significantly reduced operational costs.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com