Skip to main content
 

financial technology

Results 101 - 125 of 140Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Feb 26, 2015
The financial industry is tough. Things change fast, and the field is always becoming more competitive and global. Likewise, clients are more demanding than ever, and customers now expect nothing less than 24/7 accessibility and reliability. To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology – especially regarding mission-critical applications.
Tags : 
apps, technology, finance
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology – especially regarding mission-critical applications.
Tags : 
financial services, applications, finance industry, it finance, financial demands, finance
    
Riverbed
Published By: Digital Realty     Published Date: Feb 24, 2015
GoGrid needed a state-of-the-art data center in the heart of the financial district to be up and running within days. As a fast-growing technology company headquartered in the San Francisco Bay Area, they needed a scalable data center with a robust infrastructure and an experienced operations team to support the cloudbased services they provide to their customers. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security
    
Digital Realty
Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash
    
NexGen
Published By: IBM     Published Date: Jan 05, 2015
In the IBM white paper “Disclosure management for budgeting, planning and forecasting: The next frontier?”, Gary Simon, managing editor of the Financial Systems News, discusses how disclosure management technology can move beyond its traditional use in financial reporting to also benefit budgeting, planning and forecasting functions.
Tags : 
disclosure management, budgeting, financial reporting, financial forecasting, financial planning
    
IBM
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan
    
Singtel
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management
    
IBM
Published By: Polycom     Published Date: Sep 24, 2014
There are many ways to take advantage of the rich set of collaboration tools provided with Microsoft Lync. IT leaders should consider a cap-and-grow strategy where investment dollars in legacy systems are capped and the financial and IT resources are reallocated to grow Lync. Once the company has a cap-and-grow Lync strategy, IT leaders should consider retirement of legacy infrastructure and how Lync can be leveraged as a replacement technology. Forward-looking IT leaders will consider Lync a strategic UC platform upon which to build a companywide collaboration strategy, rather than just a replacement for a legacy phone system. Get this report to read best practices for a Lync deployment.
Tags : 
grow, strategy, cap, best practices, lync, deployment, advantage, rich, collaboration, tools, investment, dollars, legacy, system, financial, resources, strategic, infrastructure, platform
    
Polycom
Published By: Riverbed     Published Date: Aug 19, 2014
Since 20017, IDC has been conducting interviews with Riverbed Steelhead customers to assess the financial impact of the Steelhead WAN optimization solution. As Riverbed Technology has added features and functionality to Steelhead, IDC has worked with Riverbed to update and add to this research by conducting additional in-depth interviews with Steelhead customers - most recently in 2012.
Tags : 
business, value, wan, optimization, financial impact, research
    
Riverbed
Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today it is a business imperative and is providing solutions to long-standing business challenges for banking and financial markets companies around the world. Financial services firms are leveraging big data to transform their processes, their organizations and soon, the entire industry.
Tags : 
ibm, banking, data, big data, financial services, technology
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, banking, business, fraud-prevention, fraud, technology
    
IBM
Published By: Salesforce.com     Published Date: Jul 02, 2014
With today's financial advisors and wealth managers facing such tough competition, the ability to thrive comes through maximizing efficiency and finding innovative ways to maintain and grow business. This white paper highlights how technology is a great partner for meeting this need: • Create more relevant interactions with customers by tracking your business in the cloud • Connect to your customer information from any mobile device • Increase sales to your customers with a deeper understanding of their needs Download this white paper to learn more!
Tags : 
salesforce.com, customer tracking, business in the cloud, financial advisors, wealth managers, mobile devices
    
Salesforce.com
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Ultimate Software     Published Date: Feb 12, 2014
For financial business leaders and other c-level executives, moving away from unclear or ambiguous “improvements” to quantifiable measurements is crucial to the overall organization. Hard, meaningful data substantiates the execution of strategic, long-term business decisions. As technology is rapidly changing, executives can be challenged to find the right systems that drive business performance, provide competitive advantages, and increase the bottom line.
Tags : 
    
Ultimate Software
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Intacct Corporation     Published Date: Jan 02, 2014
Learn the 4 essential features to bring your accounting system out of the Stone Age. Modern businesses are, by their nature, complex. But if you're using an accounting system that forces you to struggle with manual processes—limiting your flexibility and draining your productivity—you might as well be stuck in the Stone Age. But there's great news! It's 2014, and there's never been a better time to make the move to a modern accounting system. What features should you look for? Download our new checklist, "Essential Features of a Modern Accounting System," to learn how the right accounting system can help you: • Automate financial processes and optimize workflows to fit your organization's business processes. • Access real-time data to drive business insight and improve decision making. • Lower IT costs and reduce technology risks with a best-in-class cloud architecture.
Tags : 
accounting, modernizing account system, automate financial processes, business processes, real-time data access, best-in-class cloud architecture
    
Intacct Corporation
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
In this case study, a company needed to find a way to update and improve a legacy trade portal application. With the help of Collaborative, using domestic resources, the company completely replaced several legacy trade portal applications, allowing for the retirement of several application platforms and legacy databases.
Tags : 
collaborative consulting, trade portal, right price, infrastructure, better application, business documentation, inspire engagement, financial metrics, investment management, strategic technology, financial strategy, technology platforms, financial services, integration
    
Collaborative Consulting
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, sales, state/local/municipal, information technology
    
E-SignLive by Silanis
Published By: MedeAnalytics     Published Date: Mar 09, 2012
The patient access process has traditionally been highly fragmented. Integrating disparate systems into a single workflow interface can simplify the registration and financial clearance process, resulting in a reduction of bad debt, increased point-of-service cash and improved patient satisfaction. Read to find out how patient access workflow technology can streamline your front-end process and improve satisfaction for your patients.
Tags : 
healthcare, patient access, patient access intelligence, pai, debt, patient satisfaction
    
MedeAnalytics
Published By: SAP     Published Date: Nov 22, 2011
This Aberdeen report demonstrates how highly effective financial planning, budgeting and forecasting enables good decision making, even in periods of major change. Dynamic financial planning enabled through five key elements -- process, organisation, knowledge management, technology and performance enhancement -- can give business leaders the tools to take prompt action and emerge even stronger.
Tags : 
aberdeen, analyst insight, business, budget, forecast, financial planning
    
SAP
Published By: ETNA Software     Published Date: Feb 22, 2011
This whitepaper covers programming and design aspects of installation experience customization.
Tags : 
silverlight, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.