Access more. Register Today!
 
Sign In
 
 
 
 

Product Spotlight

 
available from PistolStar, Inc. d/b/a PortalGuard
PassiveKey® is designed to restore a balance between security and usability. PortalGuard's PassiveKey® protects against impersonation attacks with a secure HTTP authentication by generating a secure Time-based One-Time Password (TOTP), creating a transparent, tokenless, two-factor authentication...
available from Beta Systems Software
Garancy Access Intelligence Manager offers reliable answers to new IT challenges posed by legal compliance regulations. The solution brings transparency and security to business processes and allows them to be reviewed retroactively. The product does this by analyzing all business-relevant data...
available from eFront
With new regulatory demands (such as Solvency II, ORSA, Basel II, Basel III, MIFID amd AML) and new types of risk (including market, credit, operational, liquidity, image and IT), financial institutions must now adopt advanced risk management and analysis. The goal of an ERM (Enterprise Risk...

Top Companies

Over the last 30 years of industry change, our core mission to help our clients focus on their unique strategies and deliver exceptional investor service has never wavered. With unparalleled precision and ahead-of-the-curve solutions, we've helped over 4,400 firms in nearly 60 countries — from established global institutions to small start-up...
Shaw Systems has been a pioneer in automating the lending industry since 1967. Over 300 clients in eight countries have benefited from using our software products. We provide complete solutions for loan and lease servicing and collections and recovery.
PistolStar, Inc. specializes in tailored authentication, providing software products and services that fit with the customer's environment, as well as optimize authentication processes and address requirements for enhanced usability, security, auditing and compliance. With its comprehensive solution set, PistolStar responds to an organization's need to secure access to information and ensure regulatory compliance, while simplifying the login process and reducing the IT staff's burden of managing passwords and tracking login threats.