credit

Results 101 - 125 of 238Sort Results By: Published Date | Title | Company Name
Published By: Zooz Payments     Published Date: Nov 27, 2015
Learn how international online shoppers prefer to complete their purchases. Understand how to offer the most compelling payment method to the largest international markets.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments
    
Zooz Payments
Published By: Dell EMC     Published Date: Nov 19, 2015
Read this whitepaper to learn how to make better credit worthiness decisions in less time.
Tags : 
    
Dell EMC
Published By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends, payment processers, payment ecosystem, disruptive payments, third party payments, location based advertising, credit cards, debit cards, apple pay, google pay, contactless payments, mobile payments, mobile wallets
    
Equinix
Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability
    
Sage
Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems
Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization
    
IBM
Published By: IBM     Published Date: Apr 08, 2015
Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige Performance Excellence Award.
Tags : 
ibm, smarter processes, elevations credit union, blueworks live, cross enterprise, engagement, culture, performance
    
IBM
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl
    
Symantec
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
    
CDW-Trend Micro
Published By: LifeLock     Published Date: Mar 02, 2015
See a comparison of LifeLock identity theft protection services versus credit monitoring via card companies and credit bureaus.
Tags : 
    
LifeLock
Published By: IntelliCorp     Published Date: Feb 12, 2015
Learn the basics of how to create a comprehensive and compliant background screening program that can help your organization reduce risk and promote a safe work environment.
Tags : 
background checks, background screening, employment background check, employment verification, criminal background check, education verification, drug testing, employment screening, volunteer screening, credit reports, e-verify, motor vehicle reports, fcra
    
IntelliCorp
Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash
    
NexGen
Published By: IBM     Published Date: Feb 09, 2015
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, blueworks live, transform performances, process management
    
IBM
Published By: Dell     Published Date: Jan 21, 2015
Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.
Tags : 
dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure
    
Dell
Published By: Box     Published Date: Jan 16, 2015
BridgePay Network Solutions is a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Founded in 2011, BridgePay is a transaction gateway company that offers a full suite of payment products that enhance the security and performance of point-of-sale data as it races between merchants and banks.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash
    
Box
Published By: Quantcast     Published Date: Jan 07, 2015
Attribution models assign credit to some or all of the touchpoints that contribute to a conversion—such as impressions, clicks, web searches, and website visits. Download this attribution guide today and we’ll outline some of the most common models used to measure display advertising and get to the bottom of how they may work for you.
Tags : 
marketing attribution, attribution models, impressions, web searches, display advertising
    
Quantcast
Published By: Cisco     Published Date: Jan 05, 2015
UCS Advantage* is a limited time program that allows customers with qualified HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : 
spoofing, phishing, identity theft, lax website, cybercrime, norton
    
Symantec
Published By: IBM     Published Date: Nov 07, 2014
This webinar was presented by Carla Wolfe on the key tips of process, technology, and people. Learn how Blue Works came to grow with the industry and as a process business itself.
Tags : 
ibm, blueworks, process, technology, transform performances, change management, simple process, blueworks live, tribal knowledge, bpm development, coaching, process map
    
IBM
Published By: Impact Radius     Published Date: Oct 14, 2014
Marketers need an attribution model that offers accuracy, transparency, and flexibility in attributing credit to the many online and offline marketing channels and campaign they fund. This paper describes the specific challenges that marketing organizations face and the approach they need to take to improve results going forward. Identify the "buying journeys" of your customers and collect the insight needed to maximize your marketing budget.
Tags : 
    
Impact Radius
Published By: SugarCRM     Published Date: Oct 09, 2014
BancVue is the leader in branded, community-powered banking products that help local banks and credit unions thrive in the competitive banking industry. BancVue has tripled in size in the seven years since it began to run its business on Sugar.
Tags : 
community-powered, banking product, customer intelligence
    
SugarCRM
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics, asset management, finance
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.