financial data

Results 326 - 350 of 374Sort Results By: Published Date | Title | Company Name
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: Network Automation     Published Date: Dec 02, 2008
Every night for several years, the five Latin America offices of Michigan-based medical technology products manufacturer Stryker Corporation were forced to burn the midnight oil to turn their daily financials into a single consolidated report. Each office has its own independent ERP system, so the process required three hours to compile the data for each territory plus another 90 minutes for a financial analyst at division headquarters to merge the five spreadsheets into one document.
Tags : network automation, automate professional, erp, networking, it management
     Network Automation
By: Aprimo, Inc.     Published Date: Dec 19, 2008
Financial Company Marketing maintains all key functions of marketing in-house to include: marketing strategy, creative services, direct mail, lead management, eCommerce, emerging markets, database, reporting analytics, strategic partnerships & cross-sell, and print vendor management.
Tags : marketing process improvement, marketing resource management, aprimo, marketing productivity, data management
     Aprimo, Inc.
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : aprimo, marketing process, financial control, digital asset management, data management
     Aprimo, Inc.
By: Aprimo, Inc.     Published Date: Dec 23, 2008
BearingPoint wanted a “one-stop-shop” for its growing marketing organization that was easy to setup and didn’t require a lot of resources. A tool was needed to help with the wide-range of marketing activities that satisfied the needs of the entire marketing team. This system needed to easily handle financial and legal requests, capture campaign and event data, support creative development and reduce manual processes that contributed to the lagging of concrete knowledge of their marketing budgets and spending at any given point in time.
Tags : aprimo, marketing operations, financial visibility, marketing resource management, it management
     Aprimo, Inc.
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: IBM Software     Published Date: Jul 28, 2010
See how plans, financial reports and scorecards can help you manage performance across all data sources.
Tags : ibm software, ibm cognos, performance manager demo, financial report, sales performance, sales force, pipeline, customer behavior
     IBM Software
By: Intacct Corporation     Published Date: Jan 06, 2011
By embracing new-breed financial software solutions, organizations of all sizes are achieving and enjoying the unprecedented flexibility of anytime/anywhere instant-access to financial data, reports, transactions, and analysis.
Tags : intacct corporation, accounting and financial software, roi, auditing
     Intacct Corporation
By: IBM Software     Published Date: Oct 04, 2011
With a network of more than 200 stores across Canada, Giant Tiger wanted to find a better way to align local financial and operational planning with central corporate objectives. Learn how they automated budgeting and forecasting processes and enabled store-based users to enter actual data directly into the system via a simple web interface to reduce the budgeting cycle by up to 85 percent, save approximately 220 hours per month for store-based staff, and receive a full return on investment within 24 months.
Tags : customer, perfomance management, technology, ibm, planning objectives, budget, forecasting, investment
     IBM Software
By: HP-Intel®     Published Date: Feb 28, 2013
Priority Health recently implemented two HP P9500 Disk Arrays to handle its Oracle database, financials, and other critical data totaling around 200 TB.
Tags : healthcare, priority health, rapid data growth
     HP-Intel®
By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
     Arbor
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability
     IBM
By: Oracle     Published Date: Mar 22, 2018
The Staatsbetrieb Sächsische Informatik Dienste (SID) is the German Federal State of Saxony’s central IT service provider. SID supports the state administration with cutting-edge information technology and provides expert advice to its customers on all IT matters. Its brief includes the development, introduction, operation and maintenance of IT processes, planning, operation and administration of the IT infrastructure, and central IT procurement. SID had been operating Oracle Databases at its datacenters for many years, running on IA64 hardware. However, this older technology had to be replaced for technical and financial reasons, while SID wanted to leverage the project to re-engineer its Oracle Database infrastructure. The project was initially financed and realized for migrating the IT system FÖMISAX (Landeseinheitliche Fördermitteldatenbank des Freistaates Sachsen), the State of Saxony’s subsidies database.
Tags : 
     Oracle
By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : ibm, banking, security, cyber security, financial, insights
     IBM
By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today it is a business imperative and is providing solutions to long-standing business challenges for banking and financial markets companies around the world. Financial services firms are leveraging big data to transform their processes, their organizations and soon, the entire industry.
Tags : ibm, banking, data, big data, financial services, technology, data management
     IBM
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : salesforce, financial services, cloud, mobile, data, data center
     Salesforce
By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : technology, financial, sector, database, thomson, reuters
     Thomson Reuters
By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
     Akamai Technologies
By: Anaplan     Published Date: Apr 14, 2016
Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization.
Tags : 
     Anaplan
By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : data, breaches, organizations, global
     LogRhythm
By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : data encryption, personal security, client security, cloud initiative, password protection
     Citrix ShareFile
By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : critical data, access security, user experience, it strategy, identity federation
     IBM
By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
     Cox Business
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com