financial risk

Results 26 - 50 of 211Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Mar 01, 2012
This paper shows the results of the survey, as well as trends and expert opinions focusing on why some top organizations are able to successfully extract insight from "big data."
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
     SAS
By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : bloomberg, open symbology, market identifiers, financial instruments, analytics
     Bloomberg
By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : bloomberg, open symbology, market identifiers, financial instruments, analytics
     Bloomberg
By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
     Brainshark
By: IBM     Published Date: Jun 25, 2018
A collaboration between IBM and CLS, the largest provider of settlement and risk mitigation services for the global foreign exchange market, showed how financial institutions can reap blockchain’s benefits by managing and minimizing risks to the existing business. Instead of a wholesale approach of replacing existing systems, new functionalities were gradually embedded into current processes, moving data from legacy systems to the new blockchain solution operating in parallel. Read this report to learn more about the ongoing CLS-IBM blockchain initiative and what drives the success of its commercial implementation. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
     IBM
By: SAP     Published Date: Jun 23, 2009
Is your company seeking to incorporate finance as a core line of business? This SAP Executive Insight examines the changing role of the finance organization in today's business environment - and describes how companies can develop best-run finance organizations.
Tags : finance, sap, business realities, best-run finance organizations, executive insight, sox, agile, metric, asug, optimization, streamline, gruma, closed-loop process, strategy, expertise –based activities, erp, financials, financial performance, value engineering, grc
     SAP
By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
While being the backbone of many organization’s Offices of Finance and Accounting, it is now commonly acknowledged that this overreliance on Excel spreadsheets coupled with the lack of visibility associated with its use represents a very real risk. With automation available to improve both process efficiency and effectiveness, the challenge many companies face isn’t why they should transform their process but how. The key to overcoming this challenge is creating a strong business case for investment. One that not only sets out the objectives of the project but is also underpinned by a robust financial analysis, in the form of qualitative and quantitative ROI, and a thorough understanding of risk.
Tags : account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
     Trintech EMEA ABM Pilot
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : singtel, vpn, wan, lan
     Singtel
By: IBM Watson Health     Published Date: Nov 30, 2015
This whitepaper features a discussion of how leading healthcare organizations are developing a strategy for risk contracting and population health management.
Tags : ibm, watson health, phytel, infrastructure, finances, healthcare, software development, data management
     IBM Watson Health
By: IBM     Published Date: Feb 12, 2014
Develop or restore forecasting health by adhering to the six principles presented in this paper.
Tags : ibm, business analytics, forecasting, budgeting, financial management, risk management
     IBM
By: Symantec.cloud     Published Date: Sep 14, 2010
Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.
Tags : symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking
     Symantec.cloud
By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
     Webroot UK
By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : cloud reporting, business management, economic impact, forrester, consulting, data center
     IBM
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management
     Cenzic
By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for financial institutions and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : automated reconciliation, automated reconciliation for banks, automated certification, automated certification for banks, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
     Fiserv
By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
     Fiserv
By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
     BlackLine
By: IBM     Published Date: Jan 08, 2016
This executive report identifies opportunities for insurance companies to use weather data as an important asset in both managing operational and financial risks, as well as improving customer relationships.
Tags : ibm, insurance, financial risk, customer relationships
     IBM
By: IBM     Published Date: Apr 20, 2016
Cloudy with a chance of mishap: How weather insights can help insurers manage risk and drive client value This executive report identifies opportunities for insurance companies to use weather data as an important asset in both managing operational and financial risks, as well as improving customer relationships. It also explores how companies can start using weather data in their day-to-day operations and considers future directions in the use of weather-related information for insurers.
Tags : ibm, insurance, the weather company, ibm institute for business value
     IBM
By: SAS     Published Date: Feb 29, 2012
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
     SAS
By: Cisco     Published Date: Nov 17, 2015
Gain Immediate Value from Your Connected Factory Architecture! Imagine if you could reconfigure your production line in days instead of weeks. Or if you could cut long search times for parts in half using factory wireless across a connected factory architecture. These are only a few of the reasons why leading manufacturers deploy Cisco’s Connected Factory Solution. Now you can try out these new technologies and capabilities on a small scale, with low financial risk in your own plant with the Cisco Connected Factory Starter Kit. Create a living lab and test out one or more specific use cases. Use it as a demo to get buy in from stakeholders. Or get one production line up and running immediately and roll out a more comprehensive deployment later on.
Tags : cisco, connected factory, starter kit, manufacturing process management, programmable logic controllers, plcs, wireless equipment connectivity, convergence, data integration, infrastructure management, business intelligence, data analytics, workforce automation, networking, security
     Cisco
By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, identity theft, global fraud database, forensic analysis, credit card industry
     Iovation
By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : credit risk management, managing collateral, financial monitoring, risk analytics
     IBM
By: Delta Risk     Published Date: Sep 21, 2016
This white paper offers the Delta Risk perspective on how boards, particularly those of financial services firms, should engage in managing cyber security risks, particularly in four key areas.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com