Log in or Register for enhanced features | Forgotten Password?
White Papers | Suppliers | Events | Report Store | Companies | Dining Club | Videos
Technology
Security
Return to: BBR Home | Technology | Security | White Papers
Search Refinements

Security White Papers

View white papers from other Banking sectors:
1-15 of 19 results
Introducing Convenience to the Security Process
| By IdentAlink
As businesses adopt more electronic processes and security becomes tighter in every part of our lives (access control to our homes, offices, banks etc), we're all seeing the limitations of passwords and Personal Identification Numbers (PINs). Biometrics replaces something we know (such as a password or PIN), or something we have (such as a card or token), with something unique to us (a physical or behavioural characteristic such as face, fingerprint, signature, voice or retina).
Technology > Security > White Papers
Mobile Phone Recording: Issues & Costs Uncovered
| By Business Systems UK
With a decision from the FSA on mobile phone recording imminent – what challenges do financial services firms face and how best can they be overcome? For those firms operating on a global basis this becomes a more complex problem with disparity in regulation governing this area evident across different EU countries. This paper provides insight into the implications, costs and issues involved and includes commentary from the FSA and a review of the CESR consultation paper.
Technology > Security > White Papers
BioPassport™ Enterprise Product Family - Specifications
| By IdentAlink
Laptop/PC/client applications, server software and system administration.
Technology > Security > White Papers
Prevx - Leaders in Cloud Based PC & Internet Security
| By Prevx
Prevx targets the multiple faces of e-crime by delivering class-leading PC security solutions to benefit end users, businesses, and governments, by providing layered security solutions which are based on a real-time and sustainable anti-malware model for threat detection, prevention, and removal.
Technology > Security > White Papers
Prevx Incident Response - Prevx Finds and Fixes Infections Missed by Traditional Antivirus
| By Prevx
Prevx is the smallest, fastest, lightest, and most powerful anti-malware agent technology in the world. Prevx specialises in detecting zero day attacks, reducing the time exposed to danger and providing real-time protection against the latest and the most malicious forms of malware, including keyloggers, Trojans, and rootkits.
Technology > Security > White Papers
Prevx SafeOnline - Fighting Online Fraud
| By Prevx
Prevx help banks, eCommerce, social networking organisations, and their users fight online fraud caused by online scams, infected PCs and hijacked internet connectivity. Prevx does this simply, easily and without charge, with no impact on the user experience, their existing PC security, or an organisation’s online applications.
Technology > Security > White Papers
Data Destruction Services
| By Emedia Plus
Emedia Plus offers a wide choice of environmental data and media destruction services.
Technology > Security > White Papers
The Cost Savings of Certified for Reuse Tape Media
| By Emedia Plus
The cost of tape media is one of those significant budget line items that is causing IT directors to comment, "How can such small pieces of tape be costing my department so much?" The truth is these little pieces of media cost up to £50 each, and new and even a medium size organisation can require hundreds of new pieces of media each year.
Technology > Security > White Papers
Environment Friendly Tape Media Services
| By Emedia Plus
Reducing the cost of tape and the impact on the environment.
Technology > Security > White Papers
To Protect and Detect: An Evaluation of Compliance System Requirements for the Securities Market
| By Business Systems UK
Many financial services firms have been failing to comply with post MiFID Regulations and the Market Abuse Directive (MAD) because of aging legacy systems reports a new white paper commissioned by Business Systems (UK) Ltd and published by B.I.S.S. Research. The operational and technological problems faced by compliance officers combined with the intolerable burden of compliance and accurate reporting caused by disparate systems and databases are highlighted as significant contributing factors.
Technology > Security > White Papers
Server Virtualisation
| By CyberTech
Our white paper on virtualisation explains the vision of CyberTech on how enhanced server virtualisation of call recording systems can improve overall efficiency while exceeding regulatory compliance. Please click here to download this white paper.
Technology > Security > White Papers
Managed Security Services for Banks
| By Niscayah
Reliable security is a must for every bank, both for small branch offices and for large national sites. The threat to customers, personnel and the brand itself is ever-present. This report looks at solutions for improving bank security through managed services.
Technology > Security > White Papers
One-Time Password (OTP) Management Secured with Voice Biometrics
| By Agnitio
Many forms of authentication, ranging from PINs and passwords to stronger authentication solutions such as tokens and smart cards, have seen their adoption and management issues. However easy to use or strong an authentication process is, it will always cause people to either lock or forget their passwords or tokens and as such render themselves without access to a network or application. Although many processes exist to help users gain access through alternative means, often a temporary or one-time password (OTP) is required. In this paper we review how these OTPs can be issued securely and in a user-friendly manner
Technology > Security > White Papers
Securing Trade Floor Operations with Voice Biometrics
| By Agnitio
Voice biometrics has seen adoptions in various sectors and for a variety of use cases. The most logical use case very quickly became the use of voice biometrics in self-service speaker verification solutions. Password reset and other helpdesk self-service tasks over IVR are examples of that. Agnitio has seen an increase in demand for speaker verification used in conversations between agents or brokers and their clients. In this case the requirement is to not pass a caller to an IVR system for authentication, but to verify the client's identity simply by using whatever is said. This is a mechanism to match the claimed identity. It will serve as an extra layer of security on existing processes or indeed as a replacement for more arduous and less secure ones.
Technology > Security > White Papers
Security: A Major Concern for the Adoption of M-Banking
| By VASCO
E-banking solutions are vulnerable. The use of the internet as a communication platform, the use of computers and end-users themselves are the three components that make online banking applications vulnerable to attacks. Mechanisms such as firewalls and anti-virus software are put in place to protect users from internet attacks and viruses. Malicious users, however, are resourceful and continuously come up with new forms of attacks and viruses. VASCO has made it its business to protect users. Authentication solutions, such as those offered by VASCO, safeguard users by ensuring the identity of the user. Download this white paper to learn more.
Technology > Security > White Papers
1-15 of 19 results