Using Technology to Combat Financial Crime in Retail Banking

This report taks a look at the regulatory requirements and growing exposure to risk, that drive the adoption of anti-financial crime application and strategies. In addition, it provides insight into potentially emerging threats, the blending of business process and technology, and the increasing cost pressures that shape the development trajectory of the anti-financial crime area. The technology and vendor landscape section offers an in-depth insight into the overall AML and anti-fraud architecture, as well as the landscape of available software applications. The go-to-market section provides the necessary intelligence for vendors to formulate their marketing strategy.

This report will help you:

  • Gain insight into the challenges faced by retail banks seeking to develop their anti-financial crime practice 
  • Understand the technological evolution of anti-financial crime solutions and vendor offering landscape 
  • Gauge how market conditions are shaping the development trajectory of the anti-financial crime discipline

If you wish to read more you can purchase this title online.

Alternatively, you can download the order form here.

Report Information:

Published: January 2009

List Price: $3,395 USD

Publisher: Datamonitor

Table of Contents 

Related Research:

Application Architecture Strategies in Retail Banking (Strategic Focus)

Retail Banking Technology Spending Through 2013: Business Function Segmentation (Market Model)

 

 

Sign up for our newsletters

POLL

More in Research

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation ...

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."