new account applications

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : data breach, credential stuffing, system security, security
     F5 Networks Inc
By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
     Kofax
By: Kofax     Published Date: Sep 08, 2011
See how some retail banks have redirected their focus to a more customer -centric approach. This whitepaper includes success stories from Banco Inversis and GMAC Commercial Mortgage Corporation (now Ally Financial) which highlight how Kofax has helped them maintain and even increase their competitive edge.
Tags : kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
     Kofax
By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
     Kofax
By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
     Tripwire
By: Network Automation     Published Date: Dec 08, 2008
Often, the insurance underwriters stay late that last day of the month to enter new policies. This means that IT staff have a very small window to execute the applications critical to successful and error-free closing of the accounting books. IT staff had to run and baby sit the applications – one application requiring manual operation took over three hours to complete, another that uploads premium and claim information to the data warehouse took up to six hours.
Tags : network automation, application execution, process automation, networking, it management, data management, network management, network performance management, application integration
     Network Automation
By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : identity governance, entitlements, authorized users, orphan accounts, business activities
     IBM
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.