Security Technology Financial GlobalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Technology Financial Global returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Financial Management Solutions
 •   Data Security
 •   Budgeting, Financial Planning and Analysis
 •   Security Policies
 •   Virtualization
 •   Treasury / Cash / Risk Management
 •   Wireless Technologies and Mobile Computing
 •   Security Monitoring
 •   Business Planning

Related Searches
 •   Basics Of Security Technology
 •   Diagrams Security Technology
 •   Equipment Security
 •   Operate Security Technology
 •   Operations Security
 •   Security Conferences
 •   Security Faq
 •   Security Technology Computing
 •   Webcast Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Video: Smith & Nephew talk about why they outsourced with HP to provide a finance and administration BPO services platform for growth and competitiveness by Hewlett-Packard Company

March 2013 - (Free Research)
In this brief webcast, David Trollope, Senior Vice President of Global Financial Systems at Smith & Nephew, discusses their decision to outsource their financial business processes. Continue on to discover the criteria they focused on while choosing a BPO partner and gain insights on what they learned throughout the process. 
(VIDEO) READ ABSTRACT |

Data Protection Masterclass: Global Privacy by ComputerWeekly.com

May 2012 - (Free Research)
This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

Fighting Economic Crime in the Financial Services sector by ComputerWeekly.com

March 2012 - (Free Research)
PwC examines the impact of Cybercrime on the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

A Strategic Blueprint to Increase Return on Assets: A Global Financial Institution Case Study by Hitachi Data Systems

April 2009 - (Free Research)
A leading global financial institution embarked on a data center consolidation and reclamation project that spanned nearly 2000 servers and 76 EMC arrays. The results included US$4 million in savings by reducing physical storage capacity 40 to 60 percent. 
(CASE STUDY) READ ABSTRACT |

A Shared Environment for IFRS Reporting Can Help Drive Financial Reporting Standardization - and Savings, too by Deloitte

September 2009 - (Free Research)
This white paper discusses how the global movement toward IFRS offers companies the chance to significantly improve efficiency and reduce financial reporting costs by placing IFRS reporting in a shared environment, or "Center of Excellence" (CoE) and how IFRS CoE can help improve the quality and consistency of financial reporting. 
(WHITE PAPER) READ ABSTRACT |

OpSource Improves Global Business Management and Streamlines Revenue Recognition with Intacct by Intacct Corporation

March 2010 - (Free Research)
As OpSource grew as a company, they found many inefficiencies and challenges in their financial management system. Read on to learn how OpSource overcame these challenges by switching to Intacct for a new SaaS financial management system. 
(CASE STUDY) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Top 10 Global Insights from the Cisco IBSG Horizon Study by Cisco (E-mail this company)

July 2013 - (Free Research)
As the bring-your-own-device trend continues to rise across the globe, research shows companies that embrace BYOD could reap significant financial rewards. Find out why. 
(WHITE PAPER)

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

Tapping Cloud-Based ERP Solutions to Capture Global Business Opportunities by NetSuite

July 2013 - (Free Research)
This resource examines the challenges of launching international operations, and describes what you should look for when selecting a global financial reporting and consolidation tool. Also inside, discover whether cloud-based ERP is the right move for you. 
(WHITE PAPER) READ ABSTRACT |

Financial Management Essentials for Global Enterprises by Infor

August 2013 - (Free Research)
In this white paper, take a look at a fundamental -- and often overlooked -- part of globalization: the capabilities of your financial management system. Discover 10 "global essentials" that are must-haves for any multinational finance system. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Appleby Simplifies Global Disaster Recovery with Fluid Data Technology by Dell Compellent

May 2011 - (Free Research)
Because Appleby operates data centers in several geographic regions, replication for disaster recovery purposes is one of the company’s top concerns. The company’s decentralized storage infrastructure seemed to make multi-site replication prohibitively costly and complex. Check out this case study to learn about the solution Appleby found. 
(CASE STUDY) READ ABSTRACT |

Hudson Advisors Protects Corporate and Customer Data from Wireless Threats by AirTight Networks, Inc.

August 2008 - (Free Research)
Hudson Advisors IT team choosed AirTight's SpectraGuard Enterprise as the best WIPS and wireless performance management solution for their needs. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Virtual Criminology Report Cybercrime versus Cyberlaw by McAfee, Inc.

December 2008 - (Free Research)
Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c... 
(WHITE PAPER) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium by IBM

September 2010 - (Free Research)
Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Getting the Most from Your Wireless Network by WildPackets, Inc.

August 2008 - (Free Research)
Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts