Skip to main content
 

financial technology

Results 126 - 147 of 147Sort Results By: Published Date | Title | Company Name
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific様ike CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters様ike marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, new technology, automation, business-to-business, personalized marketing
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific様ike CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters様ike marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific様ike CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters様ike marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: IndustryBrains     Published Date: Jan 16, 2007
Based on the principle that not all clicks are equal, IndustryBrains’ site-specific content targeting solution enables Direct Agents’ financial and technology direct marketing clients to reach the highest quality audience.
Tags : 
industrybrains, pay per click
    
IndustryBrains
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance
    
A10 Networks
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin
Published By: Quocirca     Published Date: May 15, 2009
Most organisations have had to supplement their IT capability with some form of external help at one time or another. However, as financial pressures mount and technology continues to evolve and its relationship with the business becomes increasingly complex, how does this change the expectations and needs of those external relationships? Learn more today!
Tags : 
quocirca, software as a service (saas), it function, it staff, business process, customer service, it budget
    
Quocirca
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking, financial, mobile banking, provenir
    
Provenir
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Planning & Financial Management addresses this broad business issue. Planning & Financial Management is one component within the Aprimo Suite. The entire suite is based on our Enterprise Marketing Backbone that reduces total cost of ownership and connects your marketing technology with the rest of the enterprise.
Tags : 
aprimo, financial management, financial planning, marketing technology, marketing spend
    
Aprimo, Inc.
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: SAS     Published Date: Aug 03, 2016
The financial collapse of 2008 had the greatest impact on the financial services industry since World War II, resulting in consolidation and extensive regulation. The crisis coincided with increased competition from emerging economic powers, nonbanks and fintech organizations. Consumer behavior, from the adoption of mobile banking to P2P payments, forced banks to retool and respond with innovative products and investments in new delivery channels. Technology changed rapidly as well. In the capital markets, trading became fully automated, with pricing, risk decisions and settlement across exchanges made in milliseconds
Tags : 
finance, best practices, productivity, economic power, consolidation, fintech, technology, data, security, risk decision
    
SAS
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services, stocks, equities, filtering companies, filter, electronic trading, back-office
    
ETNA Software
Published By: ETNA Software     Published Date: Feb 22, 2011
This whitepaper covers programming and design aspects of installation experience customization.
Tags : 
silverlight, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Published By: IBM     Published Date: Aug 06, 2014
釘ig data薄 which admittedly means many things to many people is no longer confined to the realm of technology. Today it is a business imperative and is providing solutions to long-standing business challenges for banking and financial markets companies around the world. Financial services firms are leveraging big data to transform their processes, their organizations and soon, the entire industry.
Tags : 
ibm, banking, data, big data, financial services, technology
    
IBM
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it痴 online fraud to the highest degree. Although it痴 been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Riverbed     Published Date: Feb 26, 2015
The financial industry is tough. Things change fast, and the field is always becoming more competitive and global. Likewise, clients are more demanding than ever, and customers now expect nothing less than 24/7 accessibility and reliability. To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology especially regarding mission-critical applications.
Tags : 
apps, technology, finance
    
Riverbed
Published By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : 
finance, cyber crime, banking, security, network security, fraud prevention
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management
    
IBM
Published By: Anaplan     Published Date: Apr 14, 2016
Finance is constantly tested to keep pace in today痴 business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization.
Tags : 
    
Anaplan
Published By: Progress     Published Date: Jan 09, 2017
Did you know? 86% of organizations say they have 2 years to make inroads with digital transformation 55% say they have a year or less, before they begin to suffer financially or from competitive threats 59% are worried they may be too late To help you evaluate your organizational readiness for digital transformation, we put together a package to help you measure your current capabilities庸rom a technology and organizational perspective預s well as some information to help you plan ahead. The Digital Transformation Kit contains: CMS Evaluation Guide: Learn about CMS capabilities that can enhance the customer experience Digital Marketing Maturity Guide: Rate your usage of digital marketing technology Data-Driven Marketing e-Book: Learn how to use the power of your data to drive growth
Tags : 
    
Progress
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.