Basel ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Basel Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Treasury / Cash / Risk Management
 •   Storage Security
 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Identity Management/ User Provisioning
 •   Access Control

Related Searches
 •   Basel Applications Cycles
 •   Basel Applications Performance
 •   Basel Applications Procedures
 •   Basel Applications Utah
 •   Basel Maintain
 •   Basel Strategies
 •   Finding Basel
 •   Guideline Basel Applications
 •   Performance Basel Applications
 •   Web-Based Basel Applications
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Rules, risk and the potential for profit in the world of Basel III by IBM

September 30, 2013 - (Free Research)
Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III 
(WHITE PAPER) READ ABSTRACT |

InfoSphere Optim Data Growth Solution for Application Retirement by IBM

August 23, 2011 - (Free Research)
Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 30, 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Facilitating “sound practices” in risk management with IBM OpenPages ORM by IBM

February 08, 2012 - (Free Research)
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007 by SAS

September 2008 - (Free Research)
This report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Enterprise mobility management: Embracing BYOD through secure app and data delivery by Citrix

February 2013 - (Free Research)
Access this resource to learn more about enterprise mobility management (EMM), a mobile approach that allows IT to manage not only mobile devices themselves, but the applications and data present on them. Read on and learn about EMMs increasingly central role in the new era of IT. 
(WHITE PAPER) READ ABSTRACT |

Increase Flexibility By Embracing Future Business And Technology Trends by Progress

September 2013 - (Free Research)
This report outlines Forrester's vision for the future of business applications. It summarizes the key business drivers and trends that are reshaping the value proposition of business applications. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Application Delivery Controllers by Citrix

October 2013 - (Free Research)
This informative guide compares a variety of industry leading ADCs and outlines their strengths and weaknesses. 
(WHITE PAPER) READ ABSTRACT |

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters by Citrix

May 2014 - (Free Research)
This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Five reasons why mobilizing Windows applications is simpler than you think by Citrix

March 2013 - (Free Research)
In this white paper, uncover five myths about Windows application development and learn how your company can go mobile with relative ease. 
(WHITE PAPER) READ ABSTRACT |

A Deep Dive on DevOps and Application Deployments, Featuring a Guest Speaker from Forrester Research, Inc. by Electric Cloud

September 2012 - (Free Research)
Watch this webcast to hear Forrester Research, Inc. analyst Glenn O'Donnell discuss current challenges in application deployment and best practices for creating strong communication and understanding between your development and operations teams. 
(WEBCAST) READ ABSTRACT |

The Components of the Red Hat Application Stack by Red Hat and JBoss

November 2006 - (Free Research)
Learn how open source software standardizes Web application platforms and dramatically reduce the cost and complexity of an SOA deployment. 
(WHITE PAPER) READ ABSTRACT |

Five Ways to Ensure Your Virtualization Initiatives Effectively Support Applications and End Users by Dell Software

September 2008 - (Free Research)
This white paper seeks to help application owners, operations managers and data center managers ensure their virtualization initiatives effectively support applications and end users. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Best Practices for vSphere Application Backups by Veeam Software

May 2014 - (Free Research)
Explore this informative resource to learn about the top ten best practices for VMware vSphere Application backups as well as some smaller tips you might consider implementing in order to protect your virtual environment. 
(WHITE PAPER) READ ABSTRACT |

IT in Europe: Adopting an Application-Centric Architecture by SearchSecurity.com

November 2011 - (Free Research)
Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view. 
(EZINE) READ ABSTRACT |

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK) READ ABSTRACT |

E-Guide: Achieve the benefits of virtualized mission-critical applications by SearchDataCenter.com

November 2011 - (Free Research)
In this expert e-guide, find out about the many benefits of virtualizing your mission critical applications such as improved hardware utilization and efficiency. Also, discover where to virtualize your applications to maximize these benefits. 
(EGUIDE) READ ABSTRACT |

E-Learning Provider Reduces Liferay Development Time with Jrebel by ZeroTurnaround

December 2013 - (Free Research)
In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management. 
(CASE STUDY) READ ABSTRACT |

What Developers Want: The End of Application Redeploys by ZeroTurnaround

March 2014 - (Free Research)
For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts