Mortgage Lending Reports

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

The Future of Financial Services: Part 1
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
Posted: 08 Feb 2021 | Published: 17 Oct 2018

TechTarget ComputerWeekly.com

CW Nordics - May-July 2019: Facing up to fintech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 08 Feb 2021 | Published: 11 Feb 2019

TechTarget ComputerWeekly.com

Innovation Awards APAC 2023 - Financial Services: DBS Bank
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about DBS Technology Marketplace and how it delivers anything-as-a-service (XaaS) capabilities that enable the bank's applications teams to adapt cloud-native applications quickly and efficiently.
Posted: 20 May 2023 | Published: 21 May 2023

TechTarget ComputerWeekly.com

Streamlined corporate payment systems: Increase flexibility, save time and money
sponsored by IBM
WHITE PAPER: This white paper explores how business process management (BPM) can be used to streamline corporate payment operations for increased customer satisfaction and significantly reduced operational costs.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Computer Weekly – 29 October 2013: Innovation in banking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to leading European banks to find out how they are using technology to build a closer rapport with customers. We ask whether Microsoft's Windows Server is now ready to rival VMware for hybrid cloud projects. And we assess the emerging leaders in the flash storage market. Read the issue now.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

TechTarget ComputerWeekly.com

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security