banking

Results 226 - 250 of 368Sort Results By: Published Date | Title | Company Name
By: Kaseya     Published Date: May 13, 2015
Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach.
Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, finance
     Kaseya
By: Kaseya     Published Date: May 13, 2015
From dealing with rogue “IT hobbyists” to latest compliance hurdles, Kaseya presents solutions for common IT systems management pain points in the Banking Sector.
Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, finance
     Kaseya
By: IBM     Published Date: Apr 23, 2015
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : ibm, analytics, efficiencies, digital banking, management, strategy, data management, data center
     IBM
By: IBM     Published Date: Apr 23, 2015
Banks face many challenges as they strive to return to pre-2008 profit margins including reduced interest rates, unstable financial markets, tighter regulations and lower performing assets. Fortunately, banks taking advantage of big data and analytics can generate new revenue streams. Watch this real-life example of how big data and analytics can improve the overall customer experience.
Tags : ibm, big data, profit margins, regulations, analytics, customer experience, banking, bank
     IBM
By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : finance, cyber crime, banking, security, network security, fraud prevention
     IBM
By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : ibm, computer security, network security, malware protection, network security, security organization
     IBM
By: IBM     Published Date: Apr 06, 2015
Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board.Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : mobile capture, customer service, ibm, banking, insurance, healthcare, government, it management
     IBM
By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
     Symantec
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
     CDW-Trend Micro
By: IBM     Published Date: Mar 18, 2015
While we predict a burgeoning market for payment services hubs, we see a growing market for payment frameworks. Celent has often said that, in most instances, moving to a single hub is perhaps the aspirational goal, but is unlikely to be the short-term answer. Celent believes that, for many banks, a combination of a hub and a framework may be the right solution.
Tags : financial institution support, bank payment technology, ibm, burgeoning market, payment services hubs
     IBM
By: IBM     Published Date: Mar 18, 2015
View this ebook to learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : customer service, productivity solutions, customer-centric banking environment, automated financial transactions, ibm
     IBM
By: IBM     Published Date: Mar 18, 2015
Top performing organizations search for a single solution that enables them to process, monitor, and report their customers' financial transactions. The results are improved profit margins, compliance, and satisfied customers. This Aberdeen report identifies the problems facing financial institutions today, the technology they adopt, as well as the benefits of a single, central solution.
Tags : ibm, customer service, automated financial transactions, financial institution solutions, customer's financial transactions
     IBM
By: Polycom     Published Date: Mar 13, 2015
As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Polycom     Published Date: Mar 13, 2015
United Bank for Africa (UBA) Group is one of Africa’s leading financial institutions offering banking services to more than seven million customers via 750 branches in 18 African countries. With further offices in New York, London and Paris, UBA is connecting people and businesses across the world through retail and corporate banking, innovative cross-border payments, trade finance and investment banking. Over the past three years, UBA had undergone a period of rapid expansion that had seen affiliate banks in 16 African countries come on board. This expansion has naturally put the group’s communication infrastructure under pressure.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Kaseya     Published Date: Mar 12, 2015
From dealing with rogue “IT Hobbyists” to latest compliance hurdles, Kaseya presents solutions for common IT systems management pain points in the banking sector.
Tags : it systems, systems management, financial institutions, banking sector, compliance hurdles, it management
     Kaseya
By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : it systems, systems management, financial institutions, banking sector, compliance hurdles
     Kaseya
By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : mobile capture, ibm, process agility, customer service, it management, enterprise applications
     IBM
By: IBM     Published Date: Feb 18, 2015
IBM Rational test automation capabilities and tools can help software integrators, developers and testers alike overcome the challenges of testing banking, insurance and financial market applications.
Tags : ibm, automation capabilities, automated testing, business agility, testing banking, it management, enterprise applications
     IBM
By: IBM     Published Date: Feb 11, 2015
Read this white paper to learn more about the emerging attack techniques used by cybercriminals in the mobile channel.
Tags : mobile malware, pc threat techniques, mobile channel, mobile banking functionality, advanced malware, security
     IBM
By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
     Kaspersky
By: IBM     Published Date: Feb 03, 2015
Find out how banks are increasing customer profitability, improving operational efficiency and managing risk more effectively with IBM Business Analytics software.
Tags : customer profitability, operational efficiency, business analytics, banking, risk management, security, it management, enterprise applications
     IBM
By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, enterprise applications
     CA Technologies
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : mobile malware, mobile usage, mobile security, cybercrime, security, it management, enterprise applications
     IBM
By: IBM     Published Date: Nov 22, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : commercial payment center, payments infrastructures, business agility, integrated transaction management, software development, enterprise applications, data management
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com