card

Results 1 - 25 of 447Sort Results By: Published Date | Title | Company Name
Published By: Stripe     Published Date: Aug 06, 2019
Digital commerce is enabling businesses to rethink what they sell, how they sell, and where they sell. Fickle consumer and business buyers have come to expect an intuitive and instantaneous checkout process with multiple payment options. However, aging financial infrastructure and complex interdependencies between numerous parties make it difficult and expensive to accept payments online seamlessly and across markets and currencies. Stripe meets these challenges with an API-based payments platform that abstracts away the complexities around payment gateways, acquiring banks, and credit card networks. To understand the impact of Stripe’s products on processing online payments, IDC interviewed Stripe customers and surveyed hundreds of organizations around the world about how they currently process and manage online payments. KEY FINDINGS • Many organizations are using Stripe as a foundational platform for their online businesses, with many of those also using Stripe Connect to run thei
Tags : 
payment security, payment processing, payment solutions, business analytics, platform as a service (paas)
    
Stripe
Published By: Experian     Published Date: Aug 29, 2019
Card-not-present fraud is estimated to reach $19.3 billion by 2022. Online payment fraud will grow 13.7% from 2017-2022 – Juniper Dive deeper into these data points with a focus on assessing the impact, challenges and opportunities presented by emerging payment mechanisms and regulation, as well as an in-depth assessment of sector-specific trends and outlook in regard to digital fraud. It provides essential reading for those wishing to understand where the key strategic focus should lie and how market forces are affecting the industry.
Tags : 
    
Experian
Published By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
    
TIBCO Software
Published By: SAS     Published Date: Sep 05, 2019
For many insurers, this accounting process will look familiar: • Tools and processes vary for different lines of business. • The needed data is stored in hundreds of files. • Calculations are performed by multiple, undocumented spreadsheets, with little or no version control. • Humans have to step in to help cobble together data from different channels. • The process of preparing and presenting financial data is not manageable or traceable. • The path from input data to P&L numbers is largely a black box. In a simpler time, this patchwork was passable. But change is coming. New regulations will bring greater complexity to the accounting process for insurers, which will make semi-manual, legacy processes look like a house of cards and raise doubts about the validity of the final numbers on the P&L sheet.
Tags : 
    
SAS
Published By: MicroStrategy     Published Date: Aug 28, 2019
Why HyperIntelligence? Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark. That means that more than 70% of people at most organizations are going without access to the critical information they need to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are naturally analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligence helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether
Tags : 
    
MicroStrategy
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: Megaplan IT     Published Date: Jul 16, 2012
An in-depth overview of techniques your company can employ to reduce the scope of your cardholder environment and lower costs associated with PCI DSS Compliance.
Tags : 
    
Megaplan IT
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Ricoh     Published Date: Oct 02, 2018
Your business is changing. As a finance leader, you know that accounting is a labour-intensive, costly process where systems often don’t allow for expedient exception handling and many days are fraught with difficulty in matching invoices to other databases for reconciliation. Like most companies, you know where you want to go but may not have infrastructure or internal expertise to handle electronic fund transfers, credit card payments or cheque processing— all the pieces required to make your vision for an efficient, integrated operation a reality.
Tags : 
    
Ricoh
Published By: Entrust Datacard     Published Date: Oct 17, 2016
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 17, 2016
Download your eBook today to learn more about optimizing your online presence, securing your website, and other unexpected ways to boost website engagement and increase sales opportunities.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality reshaping the enterprise. This white paper is the third in a three-part series on enabling the mobile enterprise while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 25, 2016
Download this infographic to discover how to build a successful launch plan for your digital business.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 20, 2017
Microsoft® Office 365™ continues to lengthen its lead as the world’s top enterprise cloud service. Nearly one-in-four employees in Fortune 500 companies are active on Office 365 — and more than 90% of those large enterprises currently have more than 100 active users. Users are clearly becoming more reliant on Office 365, as usage grew at a rate of more than 300% in 2016.
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.