Secure FinancialWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Financial returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Email Archiving
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Financial Management Solutions
 •   Budgeting, Financial Planning and Analysis
 •   Data Center Management
 •   Electronic Bill Presentment and Payment (EBPP)

Related Searches
 •   B2C Secure Financial
 •   Example Secure Financial
 •   Public Secure Financial
 •   Secure Financial Case Study
 •   Secure Financial Demo
 •   Secure Financial Office
 •   Secure Financial Workflow
 •   Secure Importing
 •   Secure India
 •   Trend Secure
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

First Command case study: Secure financial future with converged IT by Dell, Inc.

April 16, 2013 - (Free Research)
This white paper details a company that moved on from its legacy infrastructure to keep up with its customer service demands and IT budget. 
(CASE STUDY) READ ABSTRACT |

Capturing a Competitive Advantage with a Secure Payments Infrastructure by Intel

May 05, 2011 - (Free Research)
A number of factors are driving financial institutions to re-evaluate their payment methods.  These factors include regulations such as Single Euro Payments Area in Europe, which calls for new payment vehicles for customers. Find out how one financial institution was able to meet compliance demands by utilizing a secure payments infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 01, 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

IBM System Storage DS Family-Financial Svcs Institutions by IBM

September 2008 - (Free Research)
This whitepaper explains how the IBM System Storage DS Family can support business continuity and improve information lifecycle management with competitively priced storage options. 
(WHITE PAPER) READ ABSTRACT |

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency by Sterling Commerce, An IBM Company

September 2009 - (Free Research)
This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Solutions: Securing & Leveraging Mobile Devices by Entrust, Inc.

July 2012 - (Free Research)
This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information. 
(WHITE PAPER) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

CA Mainframe Security Compliance by IBM

June 2008 - (Free Research)
In this video, learn how to combat against regulatory, staffing and audit pressures that security management shortcomings bring to the table. 
(VIDEOCAST) READ ABSTRACT |

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by Perimeter eSecurity

January 2012 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations. 
(WHITE PAPER) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Webroot Secure Anywhere Business Value Assessment by Webroot

August 2012 - (Free Research)
Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice! 
(WHITE PAPER) READ ABSTRACT |

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by Hewlett-Packard Company

July 2009 - (Free Research)
Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses. 
(ANALYST BRIEF) READ ABSTRACT |

How To Secure Electronic Healthcare Records Effectively by HP & Intel®

June 2012 - (Free Research)
This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Get a Better Handle on Unspent Funds by SAP America, Inc.

June 2012 - (Free Research)
This paper details SAP's range of public sector solutions, designed specifically to assist government agencies in proactively monitoring their current and future spending. Learn how to get a better handle on unspent funds such as unliquidated obligations (ULOs) by drilling into layers of data to create accurate reports and projections in real time. 
(WHITE PAPER) READ ABSTRACT |

Support Global Expansion with Trade and Financial Compliance by SAP America, Inc.

November 2009 - (Free Research)
The SAP BusinessObjects Electronic Invoicing for Brazil (SAP BusinessObjects Nota Fiscal Eletronica) application helps companies that do business in Brazil meet digital invoice regulations. The application enables automated, certified, and secure communication with government systems at the state and federal level. 
(ANALYST BRIEF) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

IT matters again by ComputerWeekly.com

December 2011 - (Free Research)
This report from Deloitte argues businesses are again investing in IT to provide the differentiation and innovation critical from their competitors despite the downturn. 
(IT BRIEFING) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Spectra Libraries with BlueScale Encryption by Spectra Logic Corporation

March 2011 - (Free Research)
Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts