Security
Unlocking AI potential for CISOs: A framework for safe adoption
Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…
8 Reasons Why Customers Benefit from Online Document Delivery
Companies today are seeing the advantages of offering bills, notices, and account statements through secure customer portals. But it is clear that businesses are not the only…
5 Ways to Enable Differentiation in Transaction Banking
Differentiate or die. This is a key business and marketing principle. This provocative phrase reminds us that the Natural Laws also have very real implications,…
2020 Agenda: Are You Ready?™
By the year 2020, technologies like the cloud, mobile devices, big data, and the Internet of Things will have digitized our world in many ways….
SWIFT Services Vendor Selection Checklist
More and more corporate treasury organizations are considering SWIFT services to route payment instructions or collect account statements from their banks around the world. But…
The Truth About Indexing: Making the Most of Indexing During Your ECM Migration
You have an Enterprise Content Management (ECM) migration project underway, but you’re not happy with the current indexing structure of your archives. It turns out…
Reduce Risk with Secure Information Exchange
Every business is an information business and this is why digitization is a key corporate priority. Every enterprise exchanges massive amounts of information on a…
Security with Digital Certificates: Should you generate your own or use a Certificate Authority?
In the world of B2B, the recommended approach for ensuring the security of the documents you exchange with business partners – such as your suppliers,…
Driving Innovation & Growth
The growth of unstructured information inside the enterprise is staggering. In fact, experts estimate that over 80 percent of data in organizations is unstructured and…
How Digital Certificates Help Ensure the Security of EDI Data
When you exchange EDI documents via the Internet, the security of your data is of vital importance. It is critical that only the intended recipient…
EIM Success Stories: Turning Information into Innovation
A major natural gas company is experiencing a higher level of internal control over its procure-to-pay process and an 85 percent success rate for vendor…
Which is Best for Your EDI Program? FTP, SFTP, FTPS, or AS2?
What are the most commonly used communications protocols? FTP (File Transfer Protocol) with VPN (Virtual Private Network) FTP was the first robust, reliable file transfer…
5 Considerations When Deciding on Internet Communications Protocols
In order for two computers to exchange files (internally or across the Internet) you will need file-handling software that follows certain communication rules (protocols). If…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.