Download Government CreditWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Download Government Credit returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Financial Management Solutions
 •   Business Intelligence Solutions
 •   Treasury / Cash / Risk Management
 •   Integrated E-Commerce Solutions
 •   Fraud Detection & Prevention
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Intrusion Prevention Solutions

Related Searches
 •   Download Event
 •   Download Government Sql
 •   Download Group
 •   Download Supply
 •   Download Webcast
 •   Import Download
 •   Industry Download
 •   Operational Download Government
 •   Practices Download
 •   Web Cast Download Government
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers by ComputerWeekly.com

November 11, 2011 - (Free Research)
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now. 
(EZINE)

Computer Weekly 11 October 2011: Download this week's issue of the UK's leading technology publication, featuring the latest news, analysis and opinion on the big trends in IT by ComputerWeekly.com

October 11, 2011 - (Free Research)
In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 16, 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 15, 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

PCI DSS Success: Archiving Compliance and Increasing Web Application Availability by Citrix

September 2008 - (Free Research)
This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc.. 
(WHITE PAPER) READ ABSTRACT |

Transforming IT at HM Revenue & Customs by ComputerWeekly.com

March 2012 - (Free Research)
HMRC CIO, Phil Pavitt, gives the key facts around HM Revenue and Customs’ IT change programme in this PowerPoint presentation for Computer Weekly's 500 Club. 
(PRESENTATION) READ ABSTRACT |

Commerzbank: Managing Credit Risk and Increasing Operational Efficiency by EMC Corporation

June 2008 - (Free Research)
For Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Protecting Credit Card Data: How to Achieve PCI Compliance by Motorola, Inc.

July 2007 - (Free Research)
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution. 
(WHITE PAPER) READ ABSTRACT |

SonicWALL PCI Compliance Solution Brief by SonicWALL

February 2011 - (Free Research)
The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry. 
(WHITE PAPER) READ ABSTRACT |

QSA Tokenization Broker Assessors Guide by Intel

May 2011 - (Free Research)
Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer: Send it Fast, but Send it Safely by SearchSecurity.com

April 2014 - (Free Research)
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity. 
(EBOOK) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by IBM

August 2009 - (Free Research)
Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them. 
(WHITE PAPER) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

SANS What Works in Intrusion Prevention and Detection by Sourcefire

July 1967 - (Free Research)
This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 501 Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

USF Federal Credit Union Establishes Airtight DR with EVault and Simpler-Webb by i365, makers of Evault

April 2008 - (Free Research)
Since implementing i365 InfoStage, things have gotten a lot easier -- and a lot more comfortable -- for USF FCU. 
(CASE STUDY) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Scotiabank: Enabling real-time credit analysis by IBM

September 2013 - (Free Research)
View this resource to learn how business analytics solutions enable companies to identify and visualize trends and patterns in areas, such as customer analytics, that can have a profound effect on business performance. 
(WHITE PAPER) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

Lending and Credit Solution Brief by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

ILOG in Lending and Credit - A Solution Brief by ILOG, Inc. (BRMS)

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 1967 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts