sca

Results 1 - 25 of 4104Sort Results By: Published Date | Title | Company Name
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: VMware     Published Date: Sep 12, 2019
As the nature of work continues to evolve, modern organizations face an ever-changing set of challenges. The consumerization of IT and an increasingly mobile workforce have created a generation of workers who interact with data and information in entirely new ways. If businesses want to keep their footing in this new landscape, they must respond in ways that allow them to stay both flexible and secure.
Tags : 
    
VMware
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: KPMG     Published Date: Oct 15, 2019
Welcome to KPMG’s third annual report tracking developments in China’s pension industry. This is a topic of great economic significance. As the world’s most populous country, China has an ageing society and is developing the infrastructure to take care of a growing number of elderly people. The topic also has business significance, especially for financial companies able to find opportunities in the fast-growing pension sector. This report updates and builds on our findings from last year. That report identified sector convergence as one of the most distinct features of the Chinese pension industry, as well as highlighted several strategic themes that will influence its long-term development. In the pages that follow, we explain the most recent developments and their strategic implications.
Tags : 
    
KPMG
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Schneider Electric     Published Date: Oct 17, 2019
Powered by Smart machines, the new industrial revolution is changing how machine builders design and manufactures operate today and in the future. To remain competitive and profitable, plants and machines will have to be smarter- better connected, more efficient, more flexible and safe. This paper explains the impact of smart machines on the industrial automation and controls businesses and provides guidance for adapting to a changing industrial landscape.
Tags : 
iiot, industry 4.0, control panel, industrial automation, smart manufacturing, smart machines, smart maintenance
    
Schneider Electric
Published By: Pure Storage     Published Date: Sep 13, 2019
Discover how to revolutionize processing performance, data intelligence, customer experiences, and GRC. The future of financial services will belong to those who can capture and capitalize on data. And it all begins with employing modern data strategies in four critical areas. Description You’ll learn how to: Leverage AI, machine learning and predictive analytics. Get scalable, high-speed access to vast amounts of data. Respond faster, become more competitive, and attract new customers.
Tags : 
    
Pure Storage
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Hitachi EMEA     Published Date: Sep 24, 2019
To stay competitive and satisfy your customers in today’s digital economy, you need faster, scalable and more efficient IT performance. Adopting all-flash solutions can meet these performance demands. Now is the time to consider Hitachi as your long-term strategic partner for fast-evolving all-flash technology.
Tags : 
    
Hitachi EMEA
Published By: HERE Technologies     Published Date: Sep 23, 2019
As ride-hailing, e-commerce and food delivery services continue to grow, the value of curbside space is increasingly apparent. Though valuable and potentially lucrative, its original design is failing to live up to the needs of today's society. The demand for curbside space is growing, but the asset itself is fixed. To reduce urban congestion, ensure optimal roadway performance management, encourage new mobility solutions and facilitate on-demand delivery efficiency, it is vital that the curb be better utilized. In this eBook, gain insight from six visionaries and thought leaders with a stake in the landscape of urban mobility as they share how to better optimize curbside space.
Tags : 
    
HERE Technologies
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We ruled out Zscaler due to its overly complex architecture and PAC file requirements. The ongoing management would have been a nightmare.” - Marc Tournier, Information Security and Compliance Manager (CISO), Avril Group
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: BillingPlatform     Published Date: Jul 30, 2019
In order to give their commercial customers the best prices and most flexible purchasing options possible, Floor & Decor offers lines of credit through their preferred credit provider, CIT. To fully leverage and scale this partnership, Floor & Decor needed a way to quickly check credit availability in their retail stores on demand. It also needed to generate invoices to send to their commercial customers while providing assignment notices to CIT.
Tags : 
    
BillingPlatform
Published By: Workday APAC     Published Date: Oct 07, 2019
"Following a study of hundreds of organisations about how they scale agile, this Harvard Business Review article outlines what they’ve learned, and how to scale agile effectively. They studied small firms that run their entire business with agile methods, already agile larger companies that are becoming even more agile as they’ve grown, and organisations that are making the transition from traditional hierarchies to more agile enterprises. Download the article to discover how these organisations have scaled agile effectively. "
Tags : 
    
Workday APAC
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Agile Integration Methodology: Container-Based and Microservices-Aligned Lightweight Integration Runtimes - This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more. "The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement exec
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 01, 2019
Millions of executives, operators and technicians begin their work day by opening their CMMS or EAM system. See why IDC MarketScape names IBM a Leader in SaaS and Cloud-Enabled EAM Applications.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Reinventing Data Centers at Petabyte Scale to Enable Competitive Advantage
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat provides the difference you seek in a data storage solution for media and entertainment organizations. New demands have everyone in the industry feeling the impact of high latency storage and its impact on efficiently delivering speed to market on new and dense workload management. The Infinidat unified storage architecture enables the scale, performance and best overall TCO required to deliver an extreme competitive advantage to media and entertainment companies.
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.