- Becoming a Proactive Bank
- Speed to Revenue & Improved Customer Service: How Data Agility Underpins Success for Financial Institutions in the New Digital Economy
- How Are Banks Fighting the War on Fraud Whitepaper
- Insurance in the Cloud: A Customer Focused Approach to Innovation
- Financial Services & the State of Salesforce 2015
April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.
March 2015- Effective log management will help you achieve a holistic view of your data flows and more important, alert you to anomalies that could indicate security breaches. Stay ahead of potential threats by utilizing the following four components in your security strategy:
January 2014- Alert Logic commissioned Forrester Consulting to conduct a Total Economic ImpactÂ™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Alert Logic Solutions. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Alert Logic Solutions on their organizations
January 2015- The number of vulnerabilities identified in servers, operations systems, applications, and databases has increased at an alarming rate in the past several years-and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to vulnerabilities, so it is important to be prepared for response when a vulnerability is identified.
July 2014- In early 2012, Alert Logic launched the first in a series of reports on cloud security, with the goal of creating the IT industry's first assessment of security in the cloud for businesses considering the use of cloud computing platforms. Alert Logic's approach to these assessments, based on data associated with a large concentration of cloud workloads-i.e., the Alert Logic customer base- has proven to be a pragmatic way of gaining insight into the evolving ...
January 2015- Protect your critical data from criminal intent outside your organization, as well as from insiders that may put your information assets at risk. Many security solutions are overly dependent on 'technology' alone. A critical weak link has always been the end user. Whether by accident or malicious intent, companies need to protect themselves from employees who will inevitably make profound errors of judgment. They need a solution that provides real-time feedback to educate and motivate ...
Why is it that so many web applications are certified to be compliant with a particular standard such as PCI DSS and yet are still compromised? According to data compiled by the DatalossDB project, breaches caused by web applications and web-related flaws comprise 11% of all breaches while another 18% fall into the "hack" category (some of which are likely web application related).
Is the scanner the problem? Is it the auditor? On the other hand, ...
The capital markets industry runs on sensitive information. From confidential customer data and payment card account numbers to sensitive financial analyses, the lifeblood of financial firms is their ability to protect secrets.
Many financial firms invest significant time and energy into identifying sensitive information. Still, many fall short in their ability to detect and control the unauthorized leakage of that information.
Data loss comes in many forms. These range from the malicious insider ...
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization. You will learn how techniques including cluster analysis, anomly detection, time series analysis, social network analysis, predictive models and scoring can be used to detect suspicious activity in real-time so your orgnization can take action to minimize risk and increase positive outcomes.
As a final step, you will learn how ...
Wash sale adjustment is one of the key components of cost basis adjustments. The author has used transactional analysis to explain the complexities, reconciliation techniques and recommendation of wash sale adjustments.
In this paper, the concept of sub-lot is introduced to track wash sale adjustments of high volume. This will facilitate reconciliation between the broker and taxpayer, identification of wash sales adjustments and will help to provide explanation to IRS (Internal Revenue Service) ...
Learn Why Protecting Your Online Channels and Applications is Critical.
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Leveraging its vantage point as the world's largest distributed computing platform, Akamai's EdgePlatform offers ...
Traditional perimeter defense solutions have not kept pace with the rapid growth in risk. Rigid, centralized defenses do not provide the flexibility or scale necessary to combat the outsized, adaptive threats facing today's IT infrastructure.
Cloud-based security services offer an innovative approach to helping organizations address the limitations of traditional perimeter solutions by adding a globally distributed layer of defense. This instantaneously scalable layer is designed to deliver a level of protection that ...
May 2010- Poor website performance leads to dissatisfaction more often than any other factor, particularly in financial services. As financial institutions add more features and functionality, have the basics of site performance and reliability fallen out of focus? Download this research study to learn more.
February 2010- What are the implications this year for compliance and risk managers, particularly for monitoring and surveillance? Find out how bankers are rethinking, rebuilding and redesigning in light of the themes emerging for 2010 and beyond.
August 2009- Few managers realize the security and management risks that have blossomed in their organizations with the prevalent use of FTP. This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability, while decreasing security exposures and adhering to growing compliance/auditing requirements.
March 2009- It is mandatory for public companies across the US to comply with the provisions of the SOX Act. Organizations may face financial penalties as well as reputational hassles in case of failure to comply, which can, in turn, lead to inefficient processes and controls within non-complying organizations. Experts believe that investors’ confidence in organizations can be shaken owing to lack of accountability, reliability, and accuracy in corporate disclosures. SOX experts believe that organizations fail these ...
November 2008- The Entrust Authentication and Fraud Detection Buyer’s Guide guide has been developed to assist financial services organizations in identifying their requirements for an authentication and fraud-detection solution, and in selecting a solution that meets their security needs. It outlines key questions that should be considered during the selection process to ensure that the chosen solution will address the organization’s requirements both from a business and operational perspective.
August 2008- Spector 360 can help financial companies hold employees accountable. In this case study, this financial firm had no way to keep track of PC and Internet activity when employees worked with company-issued laptops in the office, at home, or on the road ... despite having an industry-leading Internet filtering program in place and a written Acceptable Use Policy. Enter Spector 360. With Spector 360, even the firm's Partners tell clients "we know all."
December 2008- Today’s financial sector landscape is changing fast, and technology executives are asked to keep up with changing business needs. In a challenging economy, IT staff must integrate diverse technologies from consolidated institutions, solve compliance issues, and somehow figure out a way to do it under budget with less staff. In this new white paper, learn how maximizing efficiency in IT enables financial institutions to do more with less. With today’s mounting economic challenges, ...
February 2008- Many organizations have successfully implemented IBM Tivoli Identity Manager to leverage its automated provisioning capabilities for enterprise application administration and access control. This datasheet describes the benefits of deploying Aveksa 3 as an enterprise-wide solution for Access Governance complementing IBM Tivoli Identity Manager to deliver a complete access governance and compliance solution.
January 2007- This White Paper has been commissionned by ILOG to describe the issues for financial services firms in the European Securities Market relating to new regulations created as a result of the Market in Financial Services Directive (MiFID).
April 2008- The Market in Financial Instrument Directive (MiFID), a far-reaching piece of European legislation, is aimed at creating a unified European capital market and providing strong protection for investors. Everyone in the financial community offering investment services in Europe must conform to the MiFID provisions as enacted by the governing regulator. Of the new requirements, ILOG's Business Rule Management System (BRMS) is especially helpful in the following areas: Client classification, Suitability and appropriateness tests, and Best ...
View All Categories
INSURANCE: Architecture/Infrastructure, Claims, Customer Insight/Business Intelligence, Distribution, Management Strategies, Policy Administration & Management, Regulation/Financial Systems, Security/Risk Management