Mortgage Companies White Papers

(View All Report Types)
Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency
sponsored by Sterling Commerce, An IBM Company
WHITE PAPER: This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units.
Posted: 11 Sep 2009 | Published: 01 Sep 2009

Sterling Commerce, An IBM Company

Core System Transformation and Simplification for Banking
sponsored by IBM
WHITE PAPER: This white paper reveals five smarter banking solutions which can transform your infrastructure while reducing costs. In particular, see how smart service-oriented architecture (SOA) can provide the greater application connectivity to help financial institutions reach their goals.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

IBM

Dark Pools of Liquidity: Understanding & Technology dependencies for the future
sponsored by Wipro
WHITE PAPER: This white paper provides insight into the dark pools of liquidity, discusses the mechanism of dark pools trading, advantages and how technology would impact the operations or provide benefits in trading over this medium.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro

Best Practices in Data Management
sponsored by SAS
WHITE PAPER: The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007

SAS

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

Growing Market Share in a Highly Competitive Financial Services Industry
sponsored by Keynote Systems
WHITE PAPER: Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user.
Posted: 23 Jan 2005 | Published: 01 Jan 2004

Keynote Systems

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software