Best Practice

For Banks, its Evolve or Die

12th March 2018

Company: DataStax
Disruption demands change, and the place to start is at the data layer. read more
/collatthumbs/10028.jpg

The Challenge of Building a Central Treasuryin a Decentralized Company

8th March 2018

Company: BELLIN
Find out how the treasury department at Ferguson (formerly Wolseley), the world's largest trade distributor of plumbing and heating products, was faced with the challenge of building and maintaining a central treasury operation in a decentralized company, and hear about the treasurers’ approach to gaining control through visibility, enabled by... read more
/collatthumbs/10025.jpg

'Three Steps To Heaven' But Five To Invoicing Bliss

6th March 2018

Company: EASY SOFTWARE UK
A Blog written by George Haddaway (Sales Manager at EASY Software UK). This article discusses the problems with invoice management today, and how moving to digital finance can help with your invoice process. George talks you through the 'Five Ways to Invoicing Bliss': Extraction, Workflow, Archiving, Integration and Reporting. read more
/collatthumbs/9992.jpg

eBook: 8 Industry Best Practices for a Successful Mobile First Strategy

13th February 2018

Company: VASCO
Financial institutions strategically aim for customers to do more with mobile while minimizing fraud exposure tied to untrusted, high-risk devices. To enable growth in the mobile channel, financial institutions need to provide fast, convenient and frictionless high-value services delivered as securely and fraud-proof as possible. To achieve this... read more
/collatthumbs/9980.jpg

The Move to Cloud Born Microservices in Collateral Management

5th February 2018

Company: Calypso
Article published in Finadium’s Securities Finance Magazine, Issue 9 --------- The financial technology industry is seeing a move away from one-size-fits-all enterprise systems to cloud-native microservices based on the separation and segmentation of individual tasks. While these microservices can also be aggregated back into a big platform,... read more
/collatthumbs/9956.jpg

MiFID II and Mobile Call Recording Checklist

19th January 2018

According to MiFID II: "Investment firms must take all reasonable steps to record relevant telephone conversations and electronic communications that are made with, sent from or received by equipment provided by the investment firm to an employee or contractor". Check out our Mobile Call Recording checklist to help you achieve compliance. read more

EXPERIENCE REPORT OF ORSA PROCESS IN ZEB.CONTROL - ADDRESSING COMMON CHALLENGES

15th January 2018

Company: zeb
Since the preparation phase for Solvency II began, insurance companies have been gathering valuable experience in conducting own risk and solvency assessments (ORSA). The regularly submitted ORSA reports have now been analyzed by Germany’s financial supervisory authority. As part of this analysis, the regulator identified needs for action and... read more
/collatthumbs/9932.jpg

IRRBB: INTEREST RATE RISK IN THE FOCUS OF SUPERVISORY ACTIVITIES

8th January 2018

Company: zeb
With their latest publications, the supervisory authorities have made a first step towards the implementation of IRRBB standards on a European level. What’s more, the future roadmap of upcoming publications has also been clearly defined. Thus, institutions will be facing several conceptual and technical challenges and have to comply with numerous... read more

Comarch tPro ECC

1st December 2017

Company: Comarch Finance
Comarch tPro ECC - Protect your customers from remote attacks and save on operating costs Need a cost-effective solution for digital signature? Here it is: Comarch tPro ECC, an innovative USB token designed to provide corporate and private banking customers with the highest security level. read more

Comarch Identity and Access Management

1st December 2017

Company: Comarch Finance
Comarch Identity and Access Management - Secure your business data and infrastructure while staying GDPR-compliant Comarch Identity and Access Management (IAM) is a solution that allows full control over the access to company’s applications, VPNs and workstations. It comes with world-class methods for identity lifecycle, authentication,... read more