Financial Services and Insurance Industry Reports

The Digital Transformation Agenda
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This survey of business leaders by the Economist Intelligence Unit for Pegasystems finds that businesses are mostly confident they will reach their digital transformation agendas, but senior business leaders need to be more closely involved.
Posted: 08 Feb 2021 | Published: 09 Jan 2017

TechTarget ComputerWeekly.com

Fintech: Meet ten financial services disruptors - Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
Posted: 08 Feb 2021 | Published: 07 May 2019

TechTarget ComputerWeekly.com

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

The CFO’s Guide to Emerging Trends in Financial Technology
sponsored by TechTarget ERP
EBOOK: There are huge benefits to be reaped in the realm of cloud computing and mobile technology when it comes to your financial software. Read this e-book to learn the today's top trends when it comes to your financial management.
Posted: 30 Jul 2012 | Published: 30 Jul 2012

TechTarget ERP

Best Practices in Data Management
sponsored by SAS
WHITE PAPER: The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007

SAS

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

How to make technology a catalyst for high performance finance
sponsored by Infor
WHITE PAPER: Check out this white paper to examine the forces of today that are converging to change the role of the finance and explore how technology is providing new ways to solve old problems.
Posted: 09 Jul 2013 | Published: 09 Jul 2013

Infor

BPM Adoption Patterns & Practices in Industry
sponsored by Oracle Corporation UK Ltd
WEBCAST: Watch this webcast to learn how organizations in the financial services, communications, utilities, and retail industries are adopting business process management (BPM) software and using best practices to address their pertinent process challenges to deliver relevant business value.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Oracle Corporation UK Ltd

Computer Weekly – 29 October 2013: Innovation in banking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to leading European banks to find out how they are using technology to build a closer rapport with customers. We ask whether Microsoft's Windows Server is now ready to rival VMware for hybrid cloud projects. And we assess the emerging leaders in the flash storage market. Read the issue now.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

TechTarget ComputerWeekly.com