Mortgage Banking Reports

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

IBM Systems Solution for Branch Banking: Installation Guide
sponsored by VMware and IBM
BOOK: This IBM Redbook discusses how to install and configure the components of the Systems Solution for Branch Banking, a hardware and software solution that enables banks to provide a common, easy-to-support IT infrastructure in their branc...
Posted: 04 Jun 2007 | Published: 01 Feb 2007

VMware and IBM

Recognizing the Value of Data Management in the Financial Sector
sponsored by Bloomberg
EGUIDE: The combination of poor reference data management and the Dodd-Frank Wall Street Reform and Consumer Protection Act is creating a data management mess for many in the financial sector. Access this expert resource to explore how organizations can start preparing to meet new compliance regulations and increase data transparency.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

Bloomberg

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing

Six tips for getting the most out of SAP Workflow
sponsored by Dolphin
EGUIDE: View this expert E-guide to learn more about how you can implement SAP Workflow in your organization. Discover how a properly designed SAP workflow will help your business with automated routine financial processes with areas like asset accounting and auditing.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

Dolphin

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Fintech : Meet ten financial services disruptors - Part Two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com