RSS feed Get our RSS feed

News by Topic

was

Results 1 - 25 of 1545Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
     Entrust Datacard
By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
     Blackberry
By: Larsen & Toubro Infotech(LTI)     Published Date: Aug 13, 2019
The client, under a managed services contract for infrastructure services, was dissatisfied with the existing service provider due to stagnant quality of support, lack of innovation and inferior/ deteriorating end user. They wanted reduced downtime and optimal operational metric, and enhanced end-user experience. LTI helped in executing a series of interventions as part of the “Amplified Outcomes” support model. Business benefits a. 30% reduction in TCO b. 65% reduction in alerts c. 70% reduction in P1 tickets
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : augmented reality, big data, water
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : water, plant, pump
     Schneider Electric
By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : analyst, artificial intelligence, intelligent automation, rpa
     Automation Anywhere APAC
By: Riskified     Published Date: Aug 06, 2019
The outlook for online electronics sales is bright, with global sales set to surpass $300 billion in 2018, a 10.7% increase over 2017. The US and Europe are anticipating healthy growth as customers (particularly millennials) become more comfortable making larger purchases online: Best Buy’s 2017 Q4 revenue from online sales in the US was up 17.9% over the previous year. But the largest contributor to this surge will be China, where the enormous population is rapidly adapting to shopping online.
Tags : 
     Riskified
By: HERE Technologies     Published Date: Aug 08, 2019
The overall supply chain is becoming increasingly complex. When running smoothly, this global system lowers costs and improves quality, but as more moving parts are introduced the potential for inefficiency increases. Greater visibility is key to preventing disruptions and gaps in the supply chain - and location data is the key to enhancing visibility. By reading this eBook, you will discover: How location intelligence can help identify areas that are ripe for optimization How real-time data can provide useful insights on supply chain health and help identify waste in your processes How HERE helped a car manufacturer identify millions in savings annually by adding location awareness to its supply chain planning
Tags : supply chain, transport and logistics, mapping
     HERE Technologies
By: IBM APAC     Published Date: Jul 19, 2019
Disruption to data availability has the ability to cripple an organisation, and in the consumer goods market, restricted access to data could cause goods to take longer to get to market. To prepare for data outages, it is imperative that businesses have effective backup and recovery solutions in place to minimise downtime and maintain functionality. This case study examines how PT Wings Surya, a leader in the Indonesian consumer goods market, was able to increase business uptime, cut the time taken to run backup jobs from 8 to just 2 hours, and reduce backup costs by 60%.
Tags : 
     IBM APAC
By: IBC365     Published Date: Aug 08, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files.
Tags : 
     IBC365
By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014… • The seminal DevOps book—Gene Kim’s The Phoenix Project—was one year old • Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 • "Continuous Testing” just started appearing in industry publications and conferences2 • Many of today’s popular test frameworks were brand new—or not yet released • The term “microservices” was just entering our lexicon • QC/UFT and ALM were still sold by HP (not even HPE yet) • Only 30% of enterprise software testing was performed fully “in house”3 • There was no GDPR restricting the use of production data for software testing • Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadn’t even been announced Times have changed—a lot. If the way that you’re testing hasn’t already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
     Tricentis
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
HfS published the Top 10 Cognitive Assistant Service Provider report that explores the emerging conversational service provider ecosystem across key areas including execution ability, innovation capability, and the voice of the customer. The conversational services called as Cognitive Assistants, go beyond the traditional chatbots and augment human-customer interaction across both front- and back-office business operations. IBM was recognized for its market leadership in Cognitive Assistant that harness the power of IBM Watson capabilities – including NLP, conversation and analytics. HfS also merits IBM for demonstrating the greatest volume and depth of cognitive assistant use cases across industry verticals and enterprise processes.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
IBM rarely, if ever publicly, talks about the future of IBM Z. When IBM's sales managers have a oneon-one client conversation (under NDA), they might inform the customer about the next processor, but the company rarely talks about the mid- to long-term future publicly. An obvious reason for this is not to disrupt sales, but at the same time, IBM believes that it is sometimes working on problems that the market might not know it has yet. IBM felt that it was doing a disservice to its current and future customers by not being more open, which is why Tarun Chopra, director, Product Management for IBM Systems, and Ross Mauri, general manager, IBM Z, agreed to talk to IDC about the future of IBM Z. In these conversations, IBM was not putting a date on any of the topics it was willing to discuss. But the company was willing to talk about where it is investing R&D dollars and skills.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 22, 2019
The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement executives. • How the procurement team is driving towards an increased ROI through a more modern and user-friendly experience that enables the overarching enterprise business strategy. • How IBM is playing as a procurement partner by bringing to the table the latest and greatest technologies and services to solidify competitive advantage and differentiation.
Tags : 
     Group M_IBM Q3'19
By: Infinidat EMEA     Published Date: May 14, 2019
Data continues to grow at an astounding pace? As a result, data center space is becoming more scarce, as more arrays are acquired to store all of this data. Along with this data taking up space, it is also utilizing a great deal of power and cooling. In fact, the average data center in the U.S. uses approximately 34,000 kW of electricity each year, costing $180,000 in annual energy costs. As Infinidat set out to revolutionize the storage industry, one of our goals was to help consumers of storage build a more sustainable infrastructure that would be not only better for the environment, but also help them to save money as well. All of our patents come together to form InfiniBox, a storage solution that does just this.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : email marketing, triggered emails, audience segmentation, email capture
     Bluecore
By: Iovation     Published Date: Aug 02, 2019
You may have heard that storing device data for more than a few months has no value because fraudsters frequently switch devices. Our data shows otherwise. Over a typical 30-day period, iovation saw 2M transactions from devices with a history of fraud that was first seen on our network 3+ years earlier. That number is even more sobering for devices first seen 1-2 years earlier: 16M transactions. Fortunately, iovation’s unique device history capability provides our customers with the knowledge of whether a device has a history of fraud.
Tags : 
     Iovation
By: Apstra     Published Date: Aug 19, 2019
Typically, and since the dawn of time, network infrastructure teams chose the hardware and switch Operating System (OS) first, then designed their infrastructure, including how their infrastructure was built around this choice.
Tags : 
     Apstra
By: Apstra     Published Date: Aug 19, 2019
Yahoo Japan Corporation, one of Japan’s largest Internet service providers, is deploying Clos fabric networks for efficiently addressing their ever-growing data center traffic. Apstra® was selected for streamlining the design, build, and operations of these networks.
Tags : 
     Apstra
By: Drift     Published Date: Aug 05, 2019
Modern Marketing Is About Being in the NOW Traditional B2B marketing and sales tools were built for a world that no longer exists. They were designed with companies in mind, not customers. The focus was on capturing as many leads as possible, not providing people with the best experience possible.
Tags : 
     Drift
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
     Ounce Labs, an IBM Company
By: ExpertVoice     Published Date: Jun 14, 2019
Grab your harness as we take a deeper look into how Black Diamond partnered with ExpertVoice to assist with a product launch. When Black Diamond decided to manufacture their own climbing shoe, they knew how critical a successful launch would be to long- term success: the climbing shoe market is dominated by one manufacturer, and climbers are an extremely loyal group. Breaking into the market would be tough. Although ExpertVoice had a daunting task ahead of them, they knew honing in on Experts spreading wordof- mouth recommendations was key to a successful product launch.
Tags : 
     ExpertVoice
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics