Investment Services Industry Reports

Fintech: Meet ten financial services disruptors - Part One
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
Posted: 08 Feb 2021 | Published: 07 May 2019

TechTarget ComputerWeekly.com

CW Nordics - May-July 2019: Facing up to fintech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Streamlined corporate payment systems: Increase flexibility, save time and money
sponsored by IBM
WHITE PAPER: This white paper explores how business process management (BPM) can be used to streamline corporate payment operations for increased customer satisfaction and significantly reduced operational costs.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

Core System Transformation and Simplification for Banking
sponsored by IBM
WHITE PAPER: This white paper reveals five smarter banking solutions which can transform your infrastructure while reducing costs. In particular, see how smart service-oriented architecture (SOA) can provide the greater application connectivity to help financial institutions reach their goals.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

IBM

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

Managing the Transition to International Financial Reporting Standards (IFRS)
sponsored by Oracle Corporation
WHITE PAPER: The white paper discusses what US organizations can do to prepare for International Financial Reporting Standards (IFRS), and focuses on what Oracle's Enterprise Performance Management solutions can do to help with top-end reporting.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Oracle Corporation

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security