- Single Sign-On: with Passwords, Less is More
- Every Business Is a Mobile Business
- Equipping the Front Office for the New Risk Environment
- A Strategy for Governing IT Projects, Programs, and Portfolios Throughout the Enterprise
- Closing the Loop: Using the Voice of the Customer to Improve Branch Operations
July 2012- This whitepaper examines the vital role of derivatives in the capital markets, reviews the regulatory initiatives, and provides insights into the communications and connectivity landscape for the OTC derivative trade lifecycle.
July 2011- A new Forrester Research study reveals how financial institutions are rapidly moving to hosted email compliance and storage services to deal with increasing costs, risks and regulations. Bloomberg commissioned Forrester Research to evaluate the current state of archiving and compliance in the financial services sector, capture enterprise expectations, and examine changes in anticipated application delivery models.
June 2011- Download this guide from DMG Consulting and Verint Systems to learn about the Payment Card Industry Data Security Standard and its implications on your customer service operation.
Learn Why Protecting Your Online Channels and Applications is Critical.
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Leveraging its vantage point as the world's largest distributed computing platform, Akamai's EdgePlatform offers ...
Traditional perimeter defense solutions have not kept pace with the rapid growth in risk. Rigid, centralized defenses do not provide the flexibility or scale necessary to combat the outsized, adaptive threats facing today's IT infrastructure.
Cloud-based security services offer an innovative approach to helping organizations address the limitations of traditional perimeter solutions by adding a globally distributed layer of defense. This instantaneously scalable layer is designed to deliver a level of protection that ...
August 2010- Advent Software strives to achieve high standards of security and privacy safeguards for customer records and other confidential information that Advent receives. Procedures and processes are designed to conform to generally accepted industry protection objectives and safeguards such as those described in the Gramm Leach Bliley Act (GLB)1 and various state data protection regulations.
May 2010- Poor website performance leads to dissatisfaction more often than any other factor, particularly in financial services. As financial institutions add more features and functionality, have the basics of site performance and reliability fallen out of focus? Download this research study to learn more.
IDC Financial Insight’s Analyst Connection discusses how an increase in innovation throughout financial services organizations will drive future success in 2010 and beyond. One key area of focus for financial institutions is the exploration of workforce management. Employees remain a key but often underutilized resource for all financial institutions.
Utilizing workforce management tools and technologies allows institutions to optimize the untapped opportunity their employees represent, not only to reduce cost and increase profitability, ...
August 2007- This paper describes a comprehensive solution based on Microsoft and GigaSpaces technologies that addresses scalability and performance challenges with Excel-based applications in securities and capital markets industry. The solution combines the latest Microsoft technologies, including Office Excel, Excel Services in Office SharePoint Server 2007, User Defined Functions, and Windows Compute Cluster Server 2003 with GigaSpaces eXtreme Application Platform to deliver unparalleled usability, performance, and scalability.
October 2008- Competitive executives should welcome recessions. In the heat of a downturn, superior companies pull away from the competition and aspiring companies can dart ahead. In order to find patterns of success and failure, Diamond Management & Technology Consultants studied more than 400 companies and their performance (relative and absolute) before, during, and after the last recession (1998–2004).
Every day IT is being challenged to do more with less. IT needs to eliminate waste wherever it is identified so precious resources can be invested into developing revenue streams and not merely supporting standard operations. To accomplish this, every ounce of compute power needs to be wrung from existing infrastructure.
The largest area of untapped potential remains off limits for exploitation; the resources set aside for Disaster Recover (DR). Entire datacenters filled ...
March 2004- ILOG’s Business Rule Management System (BRMS) externalizes operating rules to enable business users to implement regulations, policies and strategies quickly and directly, and save time and cost by reducing IT involvement. Operating rules change constantly, and ILOG BRMS gives you the agility to put them to work immediately to keep your company compliant and in business.
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management