White Papers Credit ReviewsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers Credit Reviews returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Data Center Management
 •   Fraud Detection & Prevention
 •   Virtualization

Related Searches
 •   Chart White
 •   Document White Papers
 •   Portal White
 •   Technologies White Papers
 •   White Papers Check
 •   White Papers Credit Distributions
 •   White Papers Credit Problem
 •   White Papers Credit Sample
 •   White Papers Order
 •   White Papers Projects
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Before & After: Quantifying Business Rule Results in Key Banking Applications by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper details five actual business rule management systems deployments, providing a before and after view for each credit and lending application. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 1967 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

ILOG in Lending and Credit - A Solution Brief by ILOG, Inc. (BRMS)

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Lending and Credit Solution Brief by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses approaches for enabling greater product agility and efficiency in credit decisions, improving customer retention and attracting a higher number of new consumers. 
(WHITE PAPER) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

The State of Next-Generation Market- and Credit-Risk Analytics by IBM

November 2013 - (Free Research)
Access the following white paper to gain a firsthand look at the next-generation market and credit-risk analytics that are helping many companies through this touch economic time. 
(WHITE PAPER) READ ABSTRACT |

The optimization of everything: OTC derivatives, counterparty credit risk and funding by IBM

December 2013 - (Free Research)
In this white paper, learn about risk management practices and analytics that can aid in the optimization of everything – from OTC derivatives to counterparty credit risk to funding. 
(WHITE PAPER) READ ABSTRACT |

Protecting Credit Card Data: How to Achieve PCI Compliance by Motorola, Inc.

July 2007 - (Free Research)
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution. 
(WHITE PAPER) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

QSA Tokenization Broker Assessors Guide by Intel

May 2011 - (Free Research)
Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance: Are UK Businesses Ready? by Tripwire, Inc.

April 2010 - (Free Research)
As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention for IBM i by Innovatum, Inc.

April 2010 - (Free Research)
Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

Apache Hadoop: the Swiss Army Knife of IT by Global Knowledge

April 2013 - (Free Research)
In this white paper, discover why Apache Hadoop is being credited with holding the key to the future of big data analytics. From its open-source cost-efficiency to its additive processes, this white paper details the versatility and power of Hadoop. 
(WHITE PAPER) READ ABSTRACT |

From Transaction to Action -- How Business Events Processing is Helping Banks to Improve Business Transactions by IBM

March 2011 - (Free Research)
Numerous technological advances, including ATMs, credit cards and online banking, have significantly altered the ways in which the banking industry conducts its business. Read this white paper to learn how business event processing (BEP) can help create tailored systems to enhance customer service. 
(WHITE PAPER) READ ABSTRACT |

Reducing PCI DSS Scope: The Gateway Approach by Intel

March 2011 - (Free Research)
This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope. 
(WHITE PAPER) READ ABSTRACT |

8 Essentials of Business Analytics by SAS

July 2010 - (Free Research)
Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart? 
(WHITE PAPER) READ ABSTRACT |

Accounts Payable: Consolidating AP Workflow Outside ERP Systems by Esker Inc.

July 2011 - (Free Research)
Accounts payable (AP) automation has undeniable benefits but can be difficult in complex ERP environments. Read this white paper to explore the advantages of an automation approach that runs AP workflow outside ERP systems. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Website With Always On SSL by Symantec Corporation

May 2012 - (Free Research)
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure. 
(WHITE PAPER) READ ABSTRACT |

Protect Your IT System with Next Generation Security by IBM

October 2012 - (Free Research)
Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked. 
(WHITE PAPER) READ ABSTRACT |

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation

February 2009 - (Free Research)
All companies must take risks to survive, and the most successful companies are those that actively integrate risk management into their decision-making processes. This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

Closing Wireless Loopholes for PCI Compliance and Security by AirMagnet

December 2009 - (Free Research)
Merchants who process payment cards need dedicated wireless monitoring systems that offer full traffic analysis and comprehensive security solutions to identify wireless security loopholes, provide solutions, and document compliance for audits. Read this white paper to learn more about ensuring PCI compliance in your wireless network. 
(WHITE PAPER) READ ABSTRACT |

SSL: The Backbone of Doing Business over the Internet by VeriSign, Inc

October 2008 - (Free Research)
Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts