The capital markets industry runs on sensitive information. From confidential customer data and payment card account numbers to sensitive financial analyses, the lifeblood of financial firms is their ability to protect secrets.
Many financial firms invest significant time and energy into identifying sensitive information. Still, many fall short in their ability to detect and control the unauthorized leakage of that information.
Data loss comes in many forms. These range from the malicious insider ...
Wash sale adjustment is one of the key components of cost basis adjustments. The author has used transactional analysis to explain the complexities, reconciliation techniques and recommendation of wash sale adjustments.
In this paper, the concept of sub-lot is introduced to track wash sale adjustments of high volume. This will facilitate reconciliation between the broker and taxpayer, identification of wash sales adjustments and will help to provide explanation to IRS (Internal Revenue Service) ...
Learn Why Protecting Your Online Channels and Applications is Critical.
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Leveraging its vantage point as the world's largest distributed computing platform, Akamai's EdgePlatform offers ...
Traditional perimeter defense solutions have not kept pace with the rapid growth in risk. Rigid, centralized defenses do not provide the flexibility or scale necessary to combat the outsized, adaptive threats facing today's IT infrastructure.
Cloud-based security services offer an innovative approach to helping organizations address the limitations of traditional perimeter solutions by adding a globally distributed layer of defense. This instantaneously scalable layer is designed to deliver a level of protection that ...
The financial services industry exchanges information on securities using some 55 symbologies. Third-party providers have had to develop and maintain complex workflows in order to map diverse market identifiers to the business processes that serve their clients. This requirement has become increasingly cumbersome for third-party providers. Bloomberg's Global ID (BBGID), an open symbology system of identifiers for securities is enabling third-party providers to streamline mapping processes, and is available to the public without limitation.
Any action or condition that adds friction or cost to transaction processes detracts from the value sought by the principal parties in a trade.
An open symbology framework for financial instrument identifiers eliminates complexity, introduces transparency and reduces risk.
This whitepaper from Bloomberg describes how open symbology will affect the securities industry.
February 2010- What are the implications this year for compliance and risk managers, particularly for monitoring and surveillance? Find out how bankers are rethinking, rebuilding and redesigning in light of the themes emerging for 2010 and beyond.
August 2008- Spector 360 can help financial companies hold employees accountable. In this case study, this financial firm had no way to keep track of PC and Internet activity when employees worked with company-issued laptops in the office, at home, or on the road ... despite having an industry-leading Internet filtering program in place and a written Acceptable Use Policy. Enter Spector 360. With Spector 360, even the firm's Partners tell clients "we know all."
December 2007- Microsoft Exchange is the transportation hub of your organization’s communications. Operations depend on the critical information that moves through your Exchange environment all day, everyday, enabling business to be conducted at a more efficient pace and at lower costs than ever before.
May 2007- An exploration of typical obstacles and opportunities for customers to reduce the cost and complexity of using SSL. These opportunities are mapped to the capabilities of the Entrust Certificate Management Service that provides a complete offering for managing SSL certificates.
July 2007- As the pressure to comply with regulatory requirements combines with the growing number of users working outside the boundaries of the corporation, the need for strong authentication for large portions of an employee community has never been greater. Organizations need stronger forms of authentication that are easy to use and less costly to purchase, deploy and maintain than traditional “one-size-fits-all” options.
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management