About Basel 2Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Basel 2 returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Databases
 •   Business Intelligence Solutions
 •   Social Networks and Community Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Systems Management

Related Searches
 •   About Agency
 •   About Basel 2 Accounts
 •   About Basel 2 Coding
 •   About Basel 2 License
 •   About Basel Export
 •   About Starting
 •   About Terms
 •   Processing About Basel 2
 •   Services About Basel 2
 •   Starting About Basel 2
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Rules, risk and the potential for profit in the world of Basel III by IBM

September 30, 2013 - (Free Research)
Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III 
(WHITE PAPER) READ ABSTRACT |

InfoSphere Optim Data Growth Solution for Application Retirement by IBM

August 23, 2011 - (Free Research)
Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information. 
(WHITE PAPER) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 27, 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

Facilitating “sound practices” in risk management with IBM OpenPages ORM by IBM

February 08, 2012 - (Free Research)
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 30, 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007 by SAS

September 2008 - (Free Research)
This report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Leveraging Web 2.0 and Social Media in CRM Programs by SAP America, Inc.

October 2010 - (Free Research)
You’ve heard the buzz about Web 2.0 and social CRM, but where to start? In this eBook, find out more about Web 2.0 and social media in the context of CRM. Learn more about using Web 2.0 to build customer loyalty and get expert insight into the role that social CRM may play in the future. 
(EBOOK) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Outsourcing in the WEB 2.0 World by Wipro Technologies

September 2008 - (Free Research)
With more organizations adopting Web 2.0, there is an increasing amount of interest in exploiting this phenomenon. Learn about the changing business needs that result from outsourcing Web 2.0 and how to leverage this as a best practice for collabo... 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 for the Enterprise: Setting the Foundation for Success by Oracle Corporation

October 2008 - (Free Research)
Bringing Web 2.0 to the enterprise is more than just the latest technology; it's about changing the traditional business model and tapping into the creativity, intellect, and passion of every single employee. 
(ANALYST REPORT) READ ABSTRACT |

3-2-1 Archiving and Data Protection Best Practice by QStar Technologies, Inc.

March 2009 - (Free Research)
The 3-2-1 Archiving and Data Protection Best Practice advocates that a minimum of 3 copies of all business critical data be retained, that these copies should be kept on 2 different types of storage media, and that at least one copy should be offsite on removable media. 
(DATA SHEET) READ ABSTRACT |

Preparing for the Web 2.0 World: How Enterprises Need to Think About Emerging Social Technologies by Sun Microsystems, Inc.

April 2009 - (Free Research)
IDC expects that the significant adoption of Enterprise 2.0 technologies in the enterprise will have a dramatic impact on how organizations capture, discuss, distribute, and protect their information. If companies are not already planning for this change, they will find themselves increasingly exposed and vulnerable. 
(ANALYST REPORT) READ ABSTRACT |

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by AppAssure Software, Inc.

September 2009 - (Free Research)
Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist. 
(WHITE PAPER) READ ABSTRACT |

THE DEFINITIVE GUIDE TO: Windows Application and Server Backup 2.0 CHAPTER 2 by AppAssure Software, Inc.

August 2009 - (Free Research)
This chapter shares stories about backups to highlight problems that you yourself may have encountered. For each, we'll look at some of the root causes for those problems, and suggest ways that a modernized “Backup 2.0” approach might help solve the problem. 
(WHITE PAPER) READ ABSTRACT |

The Web Hacking Incidents Database 2009 Bi-Annual Report by Breach Security

August 2009 - (Free Research)
Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often. 
(WHITE PAPER) READ ABSTRACT |

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies by Sun Microsystems, Inc.

April 2009 - (Free Research)
Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented. 
(WHITE PAPER) READ ABSTRACT |

It's All about the Salesperson: Taking Advantage of Web 2.0 by Oracle Corporation

September 2008 - (Free Research)
This paper examines the challenges salespeople face, the growing Web 2.0 trend in the enterprise, and the drivers for a new breed of social applications that complement traditional CRM systems to help sales users close more deals quickly. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 at Work: Departmental Use Cases by Oracle Corporation

August 2008 - (Free Research)
With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SUN SYSTEMS FOR ENTERPRISE 2.0 WITH ORACLE by Sun Microsystems, Inc.

November 2009 - (Free Research)
Enterprises today are seeking new communication technologies, such as wikis, blogs, and forums, to improve communication and collaboration and increase employee productivity. 
(WHITE PAPER) READ ABSTRACT |

MAID 2.0: Energy Savings without Performance Compromises by Nexsan

January 2008 - (Free Research)
Power consumption is now a major concern and it's time you think about making your storage environment more "green." Read this white paper to learn how MAID devices can help you achieve this and find out about different MAID solutions available. 
(WHITE PAPER) READ ABSTRACT |

Web Ops 2.0: Achieving Fully Automated Provisioning by Puppet Labs

October 2011 - (Free Research)
Today’s organizations need to get out of Web Operations 1.0, mired in legacy tools, outdated approaches, and low expectations, and into Web 2.0 where tools and procedures are built from the ground up for high quality efficiency, reliability, and agile operations. Access this paper to learn about fully automated provisioning for Web Operations 2.0. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts