Best Practice

Preventing Fraud & Financial Crime in Cash Management best practice guide

4th January 2018

The Preventing Fraud and Financial Crime industry best practice guide to discover: • Current challenges to preventing corporate treasury fraud • Industry best practice for tackling internal and external fraud risk • Early warning signs associated with cash management fraud • Next steps on how to prevent corporate treasury fraud read more

Effective Liquidity Management & Cashflow Forecasting best practice guide

4th January 2018

This best practice guide Effective Liquidity Management and Cashflow Forecasting to discover how to: • Calculate your cash position with efficient liquidity management • Improving your cash management by setting up automated sweeps and cash pools • Achieve efficient reconciliation for maximum visibility on your cashflow forecasting • And... read more

Robust Multi-bank Connectivity best practice guide

4th January 2018

By leveraging SWIFT service bureau or payment factory for multi-bank connectivity, your factory can benefit from: • Improved visibility of bank accounts, leading to better liquidity management • A secure and resilient interface to multiple bank relationships • A bank agnostic form of connectivity, delivering greater bank independence and... read more

Streamlining Global Payments best practice guide

4th January 2018

This guide explores these challenges and considers a best practice approach to ensure your cross-border payments are indeed efficient and cost-effective: • Leverage multiple payment types to drive maximum efficiency and the lowest cost routing • Streamline multi-country and multi-currency payment & collection arrangements by implementing a... read more

Secure Controls and Standardised Processes best practice guide

4th January 2018

Access this best practice guide to discover how to: • Gain visibility of payment and cash management activities for your treasury management • Improve security, and control by implementing a payment factory solution • Minimise risk associated with manual processing by leveraging automated systems • Get the most from treasury management... read more

Payments and Cash Lifecycle Management brochure

2nd January 2018

Operating in a global market can present significant opportunities for businesses. Maintaining a fragmented payments infrastructure carries heavy overheads resulting in increased operating costs, technical complexity and duplication of processes. Access this brochure and learn how Bottomline's solution incorporates: • Global multi-bank... read more

Top Tips for the Disenchanted Treasurer ebook

2nd January 2018

Reducing risk, effective liquidity management, forecasting and meeting regulatory demands – these are just a few of the challenges you may be negotiating today. Top Tips for the Disenchanted Treasurer provides you with smart guidance to help you navigate your way. Download this short ebook and learn: • When a TMS is not enough • Top tips... read more

Executive brief: 5 Burning Challenges Faced by Treasury Today

2nd January 2018

Globalisation, legacy systems, multiple banking relationships and numerous payment types make managing and reporting on cash positions really tough. So what are the challenges you’re likely to face in pursuit of payments and cash management utopia? Read the 5 Burning Challenges Faced by Treasury Today and learn: • 5 critical issues treasury... read more

Comarch tPro ECC

1st December 2017

Company: Comarch Finance
Comarch tPro ECC - Protect your customers from remote attacks and save on operating costs Need a cost-effective solution for digital signature? Here it is: Comarch tPro ECC, an innovative USB token designed to provide corporate and private banking customers with the highest security level. read more

Comarch Identity and Access Management

1st December 2017

Company: Comarch Finance
Comarch Identity and Access Management - Secure your business data and infrastructure while staying GDPR-compliant Comarch Identity and Access Management (IAM) is a solution that allows full control over the access to company’s applications, VPNs and workstations. It comes with world-class methods for identity lifecycle, authentication,... read more