RSS feed Get our RSS feed

News by Topic

bad application

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
By: Neustar     Published Date: Aug 20, 2012
Learn how a DollarFinancial leverages real-time verification tools to reduce fraud, bad debt and default loans - all from the application process.
Tags : risk management, online verification, risk verification, consumer validation, consumer verification, reduce fraud, reduce bad debt, reduce default loans
     Neustar
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : security, network security, cyber attacks
     Lumension
By: Equinix     Published Date: Aug 02, 2012
Direct connection to the public cloud allows Badgeville to significantly reduce costs while increasing application performance.
Tags : equinix, cloud computing, saas
     Equinix
By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data
     Cyveillance
By: IBM     Published Date: Jul 07, 2015
Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.”
Tags : bad application, forrester consulting, engaged users, webinar, mobile app, mobilefirst, app development, webinars & web conferencing
     IBM
By: Equinix     Published Date: Jul 31, 2012
Learn how the company reduced costs, achieved LAN-speed latency with AWS, increased application performance, and improved customer experience. The added ability to expand to locations not served by public cloud provided added strategic advantage.
Tags : equinix, security, colo, lan, speed, latency, badgeville, public
     Equinix
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics