Access more. Register Today!
 
Sign In
 
 
 
 

Product Spotlight

 
available from PistolStar, Inc. d/b/a PortalGuard
PassiveKey® is designed to restore a balance between security and usability. PortalGuard's PassiveKey® protects against impersonation attacks with a secure HTTP authentication by generating a secure Time-based One-Time Password (TOTP), creating a transparent, tokenless, two-factor authentication...
available from eFront
FrontInvest centralizes teams and procedures around a fully web-based common information system, thereby rendering data reliable and manageable. With integrated capabilities for investor management, portfolio management and monitoring, and fund management, or investment deal flow, portfolio...
available from Bosch Financial Software
The Credit Decision Platform is a robust and central software solution for validating, processing and decisioning of credit applications. The credit decisioning system is used in both consumer and corporate customer credit operations. The solution supports the complete credit origination process...

Top Companies

Over the last 30 years of industry change, our core mission to help our clients focus on their unique strategies and deliver exceptional investor service has never wavered. With unparalleled precision and ahead-of-the-curve solutions, we've helped over 4,400 firms in nearly 60 countries — from established global institutions to small start-up...
Shaw Systems has been a pioneer in automating the lending industry since 1967. Over 300 clients in eight countries have benefited from using our software products. We provide complete solutions for loan and lease servicing and collections and recovery.
PistolStar, Inc. specializes in tailored authentication, providing software products and services that fit with the customer's environment, as well as optimize authentication processes and address requirements for enhanced usability, security, auditing and compliance. With its comprehensive solution set, PistolStar responds to an organization's need to secure access to information and ensure regulatory compliance, while simplifying the login process and reducing the IT staff's burden of managing passwords and tracking login threats.