Access more. Register Today!
 
Sign In
 
 
 
 

White Papers for Bank Systems & Financial Institution Technologies

Download leading-edge product research and relevant business strategies, for free. Discover smart solutions from industry experts to accelerate your business.
Managing Your Conversion Project: Building a Solid Foundation in 6 Steps
by Shaw Systems Associates, Inc.
Delivering a successful project is rarely easy. Politics, changing company directives, resource constraints, and technical issues, together or independently, can make it difficult to achieve the planned result. However, building a solid project foundation, by following these recommendations, should...

Close more business and build your brand using technology
by Advent Software
In today’s more competitive environment with more and more financial services providers adopting a “wealth management” message, independent advisors are being challenged to continue to differentiate their offering. Leading firms, however, are embracing technology in their marketing and branding to...

Commercial Loan Origination Trends
by Automated Financial Systems, Inc. -- AFS
This white paper discusses repercussions from the recent financial crisis and the profound effects on the business of lending....

Origenate
by CMSI (Credit Management Solutions, Inc.)
Origenate, CMSI’s complete browser-based loan origination software system that automates the entire workflow from origination to booking....

How to Choose the Right Credit Decisioning or Loan Origination Vendor
by Zoot Enterprises
If you find a vendor more interested in your success than their product, then you are on the right track. To find the right vendor, an FI must first prepare a foundation to make a good decision. ...

How to build a FATCA IT platform - July, 2013
by eFront
An eFront white paper - How to build a FATCA IT platform - details how your organization can build a comprehensive FATCA IT platform to strengthen your AML/KYC processes and get ready for future regulation....

FFIEC Guidelines-Layered Security How Much Is Enough
by ACH Alert, LLC
The guidance says layered security is characterized by the use of different controls at different points in a transaction process. Nine specific methods are cited by the guidance as effective controls that may be included in a layered security program. The guidance is clear not to “limit” it to those...

Running Multiple Versions and Taking Advantage of WebSphere MQ 7.1 and 7.5
by Nastel Technologies, Inc.
How to best utilize the benefits of both versions and how to get them to work together with previous versions. Get a better understanding of how to get them to all get along. Learn the key highlights of multiple version support for WebSphere MQ 7.1 and 7.5 in detail. Review the meaning of coexistence...

Mobile Deposit, Why Now and How
by Mitek Systems
Remote check capture, once a niche service offered selectively to business customers, has transformed to be a mass-market service and integral capability in mobile banking solutions. Across the US, Mobile RDC projects are underway in banks, thrifts & credit unions of all sizes to meet the market...

Portal Authentication: A Balancing Act Between Security, Usability and Compliance
by PistolStar, Inc. d/b/a PortalGuard
Maintaining robust security has become essential, as evidenced by the large and growing number of major data breaches, the most recent of which have been majorincursions affecting Target, Neiman-Marcus, Michaels Stores, the internal Web site of the US Federal Reserve, LivingSocial and many other...