2014 Issue 4

Unifying Communications in the Cloud

By Irwin Lazar, Nemertes Research The move to Unified Communications as a Service (UCaaS) is under way.  Nearly half of companies (48%) are using, planning to use, or evaluating UC applications such as Google Apps, Microsoft Office365/Lync Online, or competing offerings. At the same time, employees are dem[...]

Mobilizing the IT Service Desk

By Doug Mueller, Corporate Architect, BMCMobile technology also benefits all business users who rely on IT services. A mobile IT organization is more responsive and can resolve issues faster. As a result, the business can potentially experience less down time.In the past, mobility ha[...]

Managing Big Data for Audit Compliance and Business Intelligence

By Ryan Goldman, Director of Product Marketing, Cloudera Records and reporting requirements have long been a challenge for the financial services industry and are the original definition of the sector’s big data problem. The dual objectives of managing historical data to comply with federal requirements a[...]

Semantic Modelling...Is it utopia?

By Suresh G. Nair, Vice President & Chief Architect, Mphasis Keeping up with constantly evolving regulatory requirements has always been a challenge. Each change requires tracking down the right data, at the right level of granularity, and packaging into the right model. Invariably each need ends up cre[...]

Emerging Trends in Global DDoS Attacks

By Prolexic’s Security Engineering & Research Team The data in the Prolexic Global DDoS Attack Report for Q2 2014 shows that distributed denial of service (DDoS) attack activity and attack sizes have remained elevated throughout the first half of 2014. Compared to Q2 a year ago, DDoS attacks in Q2 201[...]

Mobile Application Strategies in Financial Services Today

By Stephen Leonard, Sr. Enterprise Solutions Manager, BlackBerry Over the last several years, corporate mobility has diversified across device types (phones and tablets of all sizes), mobile ecosystems (Android, BlackBerry, iOS, and Windows Phone), and vendors. This diversification has opened mobility to al[...]

Multi-Factor Authentication – Meeting Regulatory Requirements, Stopping Breaches

By Kim Brown, Product Marketing Manager, Webroot The cost of data breaches can cost businesses anywhere from $500K to $171M per breach, according to Gartner1. An effective option to protect against breaches is multi-factor authentication (MFA), but considerations have to be made for both the effe[...]

Cybersecurity Risk Management—Mapping the Value Chain to Create a Holistic View

By Shahryar Shaghaghi, Kurt Salmon, CIO Advisory Practice The breach of customer data at JPMorgan earlier this year pulled back the curtain on bank cybersecurity, revealing systems that are far from perfect. While regulations have helped individual banks identify and close some gaps, too many remain. The ch[...]

Finance Transformation: A Financial Services Perspective

By Sanjay Balan, Financial Services Practice Director, Perficient Traditionally, the corporate finance function has been one of consolidating financial information within the general ledger (GL), reconciling data and reporting to internal stakeholders and external entities. This has always been a fairly com[...]

Networking, Not Money, Makes the World Go Round

How SDN is changing the playing field for the financial services industryBy Stu Benington, Vice President of Cloud and SDN Business Unit, Coriant The ever increasing demand for greater networ[...]

Get Your Free Subscription - Click Here

Follow Us:

Sitemap | Privacy | Copyright © © 2017, WSTA®, All Rights Reserved.