1
5
3
4
29
5
16
1
7
14
4
3
4
6
2
2
1
6
2
4
39
3
20
2
6
24
6
1
18
5
4
3
3
3
2
3
2
1
1

Mind over metrics – how social media and analytics have changed insurance

01/04/2015
Analytics, Social

Insurance companies cannot rely on traditional structured data alone if they are to prosper in the digital age, according to a panel of industry experts and technology leaders. FST Media’s 9th annual Technology & Innovation — the Future of Insurance conference featured a panel discus

Sales performance: Are you a laggard or leader?

27/03/2015
Business Intelligence

By connecting data from a variety of data sources, including CRM, marketing automation, and finance systems, Qlik® provides greater visibility across the entire sales cycle, allowing sales to better plan and improve performance.

5 Steps to Improve Email Compliance

17/03/2015
Security

While regulations governing email security can be complex, email security doesn’t have to be. This whitepaper outlines 5 straight-forward steps that organisations can follow to develop an effective policy to help address technical security safeguard standards for email.

Old techniques, new channel: mobile malware adapting PC threat techniques

13/03/2015
Security

Learn how to mitigate fraud risks even as cybercriminals innovate and extend PC threat techniques to the mobile device. Discover how cybercriminals steal credentials from a victim’s PC via malware or phishing to commit account takeover through the mobile channel and more.

Adding Extra Security to Cloud Storage

09/03/2015
Cloud, IT Systems Management, Security

Last year over a billion digital records were compromised worldwide. Today’s organisations possess information stockpiles that have immense appeal for criminal hackers. Regrettably, with the increasing sophistication and capability of the modern hacking threat, leading industry figures now appreciate it’s not a matter of 'if' a breach will occur, but 'when'.

This complimentary white paper explores the inevitability of data breach for today’s businesses, and an elegant solution to protect your sensitive data across your entire business network, both on-premise and in the cloud.

 

The Pitfalls of Two-Factor Authentication

08/03/2015
Security

Prevent cybercriminals from identify theft and financial fraud today. Explore the shortcomings of two-factor authentication and how you can help identify the root cause of malware, phishing attacks and combat against new Trojans such as Dyre, Zeus, Citadel, Shylock and more!

This white paper explores the shortcomings of two-factor authentication, including its inability to defend against identity theft and transaction signing, as well as its negative impact on end-user experience. 

Firewall Cleanup Recommendations: Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity

02/03/2015
Security

The majority of all data breach incidents do not result from circumvention of advanced defensive systems and complex security controls; but from the failure of well-established systems, in particular firewalls, that have become too numerous and complex to manage effectively.

Financial Malware Explained

02/03/2015
Security

Explore the lifecycle of fraudulent transactions and how to take action against emerging threats, including the tactics that cybercriminals use to infect victims’ machines, harvest credentials and execute fraudulent transactions.

Using Operational Intelligence to Drive Better IT and Business Results

22/01/2015
Business Processes

IT infrastructure represents one of the most important areas of investment for any financial services firm.

Case study: Multi-channel Delivery

20/01/2015
Customer Experience

Banks often talk about improving their customer relationships but the National Australia Bank has delivered.

Breaking with Tradition in the Insurance Industry: Strategies to Insure Operational Efficiency and Future Growth

20/01/2015
Business Processes

This paper describes how Business Process Management (BPM) technologies, including adaptive case management solutions and business architecture tools, can help insurance companies apply new strategies to reduce operational cost, eliminate significant streams of paperwork from their processes, imp

Information Governance is Good Business

08/01/2015
Business Processes

OpenText Enterprise Information Management (EIM) White Paper Series is a set of publications from OpenText™ on the topic of Enterprise Information Management.

Things to consider when creating an efficient datacentre, server and telco room

08/01/2015
Customer Data

A number of factors are driving the need to examine a business’ data centre efficiency. IT infrastructure and operational activities are directly impacting an organisation’s business processes more than ever before.

Large Bank Ensures Regulatory Compliance

09/12/2014
Enterprise Information Management

Financial institutions like SMBC have been challenged with meeting increasingly stringent regulatory requirements designed to protect investors and ensure financial stability, accountability, and transparency. Customer data and management needs to meet such requirements.