Mortgage Lending Reports

Intelligent, Integrated Enterprise: The Mortgage Business
sponsored by Red Hat
VIDEO: This video provides a brief overview of how service-oriented architectures (SOAs) can help the mortgage industry stay on track and provide good service to its customers.
Posted: 08 Nov 2011 | Premiered: 08 Nov 2011

Red Hat

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

Fintech & the digital customer experience
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 08 Feb 2021 | Published: 09 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

A Best Practice Guide to Family Office Technology
sponsored by Advent Software, Inc
WHITE PAPER: Packed with practical tips and actionable guidance, this 16-page report covers all of the key technology systems that family offices need to evaluate—along with the pros and cons of each and tradeoffs to consider. It’s a must-read for any family office looking to build competitive advantage in today’s environment.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc

ebizQ.net Tip Guide: Evolving your dynamic case management strategy
sponsored by IBM
EGUIDE: This Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

IBM

Managing the Transition to International Financial Reporting Standards (IFRS)
sponsored by Oracle Corporation
WHITE PAPER: The white paper discusses what US organizations can do to prepare for International Financial Reporting Standards (IFRS), and focuses on what Oracle's Enterprise Performance Management solutions can do to help with top-end reporting.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Oracle Corporation

Smarter Lending: Returns come quickly when you increase agility, make better decisions and delight customers
sponsored by IBM
WHITE PAPER: This white paper explores the challenges modern financial institutions face when seeking to implement a smart lending strategy. Inside, learn about the unique methods and approaches available to help overcome these hurdles.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

IBM

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security