Credit Management ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Credit Management Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Financial Management Solutions
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Application Management and Maintenance

Related Searches
 •   Credit Management Applications Utility
 •   Credit Management Communication
 •   Credit Management Papers
 •   Credit North Dakota
 •   Lists Credit Management Applications
 •   Operational Credit Management
 •   Orders Credit
 •   Strategic Credit Management
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Supply Chain Management in Kraft by Board International

June 2008 - (Free Research)
In order to maintain its market leadership, Kraft Food's products should reach their destinations faster and faster, but in the most effective way. 
(CASE STUDY) READ ABSTRACT |

Managing the Chargeback Life Cycle by SAP America, Inc.

September 2008 - (Free Research)
The SAP Paybacks and Chargebacks application by Vistex allows manufacturers and distributors to manage the entire chargeback process life cycle, from claim initiation and receipt through adjudication, accrual, settlement, and post settlement adjustment. 
(ARTICLE) READ ABSTRACT |

Commerzbank: Managing Credit Risk and Increasing Operational Efficiency by EMC Corporation

June 2008 - (Free Research)
For Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority. 
(WHITE PAPER) READ ABSTRACT |

Simplify the User Experience: Enable Business Users to Automate the Integration of Microsoft Office Business Applications with the SAP Business Suite by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes how Winshuttle data management applications enable finance, accounts payable/receivable, purchasing, human resources and production planning teams to easily automate the incorporation of Excel data into an SAP solution. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

Before & After: Quantifying Business Rule Results in Key Banking Applications by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper details five actual business rule management systems deployments, providing a before and after view for each credit and lending application. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service by Imprivata

February 2010 - (Free Research)
This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs. 
(WHITE PAPER) READ ABSTRACT |

Big Data Analytics, Business Processes and Application Performance Management: A Business Manager's Perspective by CA Technologies.

November 2013 - (Free Research)
This webcast addresses the need for IT organizations to adopt a business manager's approach to Big Data analytics to manage the ocean of data from business transactions and badly performing apps. 
(WEBCAST) READ ABSTRACT |

PCI compliance in the cloud: Can cloud service providers manage PCI? by SearchSecurity.com

April 2013 - (Free Research)
Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits. 
(EGUIDE) READ ABSTRACT |

How Can Security Management Technologies Help Me with PCI Compliance? by CA Technologies.

August 2009 - (Free Research)
Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure. 
(WHITE PAPER) READ ABSTRACT |

Scotiabank: Enabling real-time credit analysis by IBM

September 2013 - (Free Research)
View this resource to learn how business analytics solutions enable companies to identify and visualize trends and patterns in areas, such as customer analytics, that can have a profound effect on business performance. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Credit Agricole of Morocco Banks on IBM XIV and ProtecTIER by IBM

August 2011 - (Free Research)
Watch this brief webcast to see how Group Credit Agricole of Moroccodeployed IBM XIV and halved response times, cut 6-hour batch runs down to 3.25 hours, and reduced administration. 
(WEBCAST) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

ILOG in Lending and Credit - A Solution Brief by ILOG, Inc. (BRMS)

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

Lending and Credit Solution Brief by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: ISACA PCI Compliance Symposium by Intel

May 2011 - (Free Research)
Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL by BlueCoat

September 2011 - (Free Research)
View this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more. 
(CASE STUDY) READ ABSTRACT |

Webinar: Implementing Powerful IT Search on the Cloud by RightScale

March 2010 - (Free Research)
Traditional, static approaches to managing IT data simply aren't built for the cloud. In this webinar, Splunk provides an alternative that is dynamic and easily deployed using the RightScale Platform. 
(WEBCAST) READ ABSTRACT |

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas by Help/Systems

October 2009 - (Free Research)
Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts