Loan Brokerages Reports

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

Fintech : Meet ten financial services disruptors - Part Two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
Posted: 08 Feb 2021 | Published: 15 Nov 2019

TechTarget ComputerWeekly.com

Innovation Awards APAC 2023 - Financial Services: DBS Bank
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about DBS Technology Marketplace and how it delivers anything-as-a-service (XaaS) capabilities that enable the bank's applications teams to adapt cloud-native applications quickly and efficiently.
Posted: 20 May 2023 | Published: 21 May 2023

TechTarget ComputerWeekly.com

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

IBM Systems Solution for Branch Banking: Installation Guide
sponsored by VMware and IBM
BOOK: This IBM Redbook discusses how to install and configure the components of the Systems Solution for Branch Banking, a hardware and software solution that enables banks to provide a common, easy-to-support IT infrastructure in their branc...
Posted: 04 Jun 2007 | Published: 01 Feb 2007

VMware and IBM

Smart Decision Making in the Era of New Financial Challenges
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn why the Monte Carlo modeling method provides a beacon of financial sanity and reliability at time when consumer confidence is at an all-time low and managers face new levels of accountability and keen public scrutiny in their decision-making.
Posted: 22 Mar 2011 | Published: 02 Mar 2009

Oracle Corporation

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.