Credit Risk Policy Case StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Credit Risk Policy Case Study returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Enterprise Financial Management Solutions
 •   Data Center Management
 •   Endpoint Security

Related Searches
 •   Articles About Credit Risk Policy
 •   Billing Credit
 •   Buying Credit Risk Policy
 •   Conference Credit
 •   Credit Group
 •   Credit Project
 •   Design Credit Risk
 •   Examples Credit Risk Policy
 •   Strategic Credit Risk
 •   Using Credit Risk Policy
Advertisement

ALL RESULTS
1 - 25 of 447 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mahaska Case Study by Imprivata

February 28, 2014 - (Free Research)
This case study shows how Mahaska Health Partnership implemented a single sign-on (SSO) along with finger biometrics for on-site users and OTP tokens for remote access. 
(CASE STUDY) READ ABSTRACT |

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security by Imprivata

February 28, 2014 - (Free Research)
This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs. 
(WHITE PAPER) READ ABSTRACT |

Commerzbank: Managing Credit Risk and Increasing Operational Efficiency by EMC Corporation

June 2008 - (Free Research)
For Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly networking case studies by ComputerWeekly.com

April 2014 - (Free Research)
Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service by Imprivata

February 2010 - (Free Research)
This case study shares one credit union's experience with an authentication solution that helped them efficiently manage user access across all applications without hindering productivity or adding costs. 
(WHITE PAPER) READ ABSTRACT |

IDC ExpertROI SPOTLIGHT - Using NetApp to Improve Storage Infrastructure Performance and Flexibility: A Case Study on TruWest Credit by NetApp

April 2010 - (Free Research)
This case study takes a look at TruWest Credit’s deployment of NetApp’s storage solution and examines the business value and benefits that were achieved. 
(CASE STUDY) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

How BI Technology is Improving Risk Management by IBM

January 2014 - (Free Research)
Access the following case study to reveal how Argos Risk used a business intelligence and analytics solution to help distinguish and alleviate risk. Not only that, discover how they also were able to drive higher business value with their data and what you can do to achieve similar results. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

Big Data: Addressing Costs, Performance, Capacity, and Management Complexity with Virtualization by IBM

October 2012 - (Free Research)
This case study reveals how multi-disciplinary engineering consultancy Dar Al-Handasah was able to rationalize and optimize its storage infrastructure in the age of big data with virtualization. Read on to learn how you can mirror Dar Al-Handasah's storage success. 
(CASE STUDY) READ ABSTRACT |

American Stock Transfer & Trust Company: A New Plan for Records Protection by Iron Mountain

April 2014 - (Free Research)
The following case study reveals the records management solution that AST used to address its needs around regulatory compliance, secure offsite storage, and proper disposal of data. 
(CASE STUDY) READ ABSTRACT |

Adventist Health System Uses FalconStor® VTL with Deduplication by FalconStor Software

December 2011 - (Free Research)
This one-page case study explores how one vendor's DR solution helped an organization reduce their backup window by more than 50%, shrink their duplicate data with an average deduplication ratio of 7:1 and maximize their efficiency through reporting and capacity planning capabilities. 
(CASE STUDY) READ ABSTRACT |

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation

August 2010 - (Free Research)
This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business. 
(WHITE PAPER) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Transaction integrity: The key to customer retention by Iron Mountain

March 2012 - (Free Research)
Read this insightful paper now to learn about the challenges surrounding the proper management of transaction documents, the benefits of optimized transaction protection and leveraging partners for storage and retrieval, individual case studies and so much more. 
(WHITE PAPER) READ ABSTRACT |

VW Credit, Inc. Drives Better Backups with ExaGrid by ExaGrid Systems, Inc.

August 2012 - (Free Research)
Check out this brief case study today to explore one company's journey to better backups. 
(WHITE PAPER) READ ABSTRACT |

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas by Help/Systems

October 2009 - (Free Research)
Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems. 
(CASE STUDY) READ ABSTRACT |

Irish Credit Union Achieves DR with Cost-Cutting Optimized Virtual Environment by DataCore Software Corporation

July 2013 - (Free Research)
In this case study, you will gain insight into how an Irish credit union achieved an optimized virtual environment with disaster recovery and highly performing applications at a significantly lower cost than other storage environments. 
(CASE STUDY) READ ABSTRACT |

Vblock Becomes the Credit Agricole Corporate Standard by VCE (E-mail this company)

December 2013 - (Free Research)
Take a look at this brief case study to learn about the challenges and results Credit Agriocle - the biggest retail bank in France and one of the largest financial services groups in Europe - encountered when deploying their private cloud system. 
(CASE STUDY) READ ABSTRACT |

American Eagle FCU Case Study by Emerson Network Power

July 2009 - (Free Research)
Learn how Emerson Network Power and its Liebert power and cooling technologies helped American Eagle Federal Credit Union achieve higher availability of data and IT services and improved energy efficiency. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 447 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts