financial institution

Results 176 - 192 of 192Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: Oracle Corp.     Published Date: Sep 20, 2012
An Oracle Solution Brief - September 2012
Tags : 
oracle, process centric banking, banking, financial service institutions
    
Oracle Corp.
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience, business technology
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
The concept and practice of stress testing has been around for many years. While traditional stress testing methodologies are still valid for firmwide scenario analysis and stress testing, special techniques and attentions are needed to successfully achieve the goal of firmwide capital adequacy in forwardlooking stress scenarios. During the 2007 financial crisis, many financial institutions were not sufficiently prepared for the ensuing liquidity crunch and capital drains. Perhaps if banks had worked through different economic scenarios prior to the crisis, they would have been in a better position to weather the storm. Inadequate preparation for crisis can lead to systemic risk and severe economic and political turmoil.
Tags : 
best practices, risk management, security, analytics, business technology
    
SAS
Published By: UpClick     Published Date: Mar 01, 2011
Intelligently routing credit cards to the right financial institutions in order to decrease declines 60+%
Tags : 
transactions, credit cards, financial institutions, decline rates, capturing sales, online purchases, acquirers, merchants, banks
    
UpClick
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
In this white paper, learn how to account for missing metric in financial reporting and valuations. How can we perform aggregate analysis of online consumer opinion to complement traditional marketing analysis and due diligence?
Tags : 
aggregate consumer voice, no longer on mute, social media, due diligence, financial institutions, voice of the consumer, business technology
    
Crimson Hexagon
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
security
    
IBM
Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management, it career advancement, business technology, data center
    
BitSight Technologies
Published By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : 
finance, cyber crime, banking, security, network security, fraud prevention
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management, knowledge management, enterprise applications
    
IBM
Published By: Datastax     Published Date: Dec 27, 2018
The world is moving at an increasingly accelerated pace. In this new Right-Now Economy, the rampant spread of payments fraud remains one of the biggest challenges for e-commerce and financial institutions. The worldwide e-commerce market was valued at $2.3 trillion for 2017, and 2018 should see even more growth, and along with it, more fraud. In the US alone, the cost of e-commerce fraud rose from $10 billion in 2014 to roughly $19 billion in 2018.
Tags : 
    
Datastax
Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
    
Q2 eBanking
Published By: Q2 eBanking     Published Date: Sep 06, 2017
Get the details on Q2's adaptable mobile architecture. Financial institutions now can close the mobile expectation gap and stay ahead of competitive pressures. Provides native integration with iOS and Android.
Tags : 
    
Q2 eBanking
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
There are three things that senior executives in the financial services industry want from their investments in computing systems. They are the same three things these institutions require for their very survival. First is unwavering security. The integrity of customer accounts and records is paramount to maintain trust across the financial ecosystem. Cybercrime is anathema to the core function of banking and cannot be tolerated. Next is captivating, personalized experiences based on real-time data analytics leading to instantaneous customer fulfillment. And finally, there is the essential delivery of these secure experiences while providing a cost and efficiency advantage over competing solutions
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q119     Published Date: Jan 17, 2019
This paper explores why Financial institutions must consider rapidly transforming their business models. It looks at how new cognitive and digital models can lead to alternative revenue sources using marketplace banking strategies and cognitive technologies, as well as extensive cost efficiencies.
Tags : 
    
Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept