Investment Industry Reports

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

The Future of Financial Services: Part 1
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
Posted: 08 Feb 2021 | Published: 17 Oct 2018

TechTarget ComputerWeekly.com

Computer Weekly – 30 July 2019: Digital takes the racing line in Formula One
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Formula One racing team Haas F1 to find out how technology is helping to compete with better-funded rivals. We examine the latest best practice advice on disaster planning. And we look at what the troubles at Deutsche Bank tell us about the rise of fintech startups. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

Core System Transformation and Simplification for Banking
sponsored by IBM
WHITE PAPER: This white paper reveals five smarter banking solutions which can transform your infrastructure while reducing costs. In particular, see how smart service-oriented architecture (SOA) can provide the greater application connectivity to help financial institutions reach their goals.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

IBM

A Best Practice Guide to Family Office Technology
sponsored by Advent Software, Inc
WHITE PAPER: Packed with practical tips and actionable guidance, this 16-page report covers all of the key technology systems that family offices need to evaluate—along with the pros and cons of each and tradeoffs to consider. It’s a must-read for any family office looking to build competitive advantage in today’s environment.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Zurich Financial Services Runs Messaging & Collaboration as a Business with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Usage-based cost-allocation has become increasingly popular for organizations looking to change their accounting methods for the way IT usage is charged. Learn about an effective and accurate solution to measure messaging usage.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.