scape

Results 1 - 25 of 862Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA
Published By: Workday     Published Date: Mar 01, 2018
ERP Must-Haves for Finance: Leave behind cumbersome reporting, spreadsheets, and data that offers zero insights. IDC MarketScape has put together a guide to help you find the best finance and accounting applications. Read an excerpt of the report to learn today’s must-have ERP capabilities and why the IDC MarketScape positioned Workday in the Leaders category.
Tags : 
erp, finance, accounting, idc marketscape
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
cloud-based system, data analytics, real time
    
Workday
Published By: Workday     Published Date: Mar 09, 2018
Workday has been recognized by global market intelligence firm, IDC, as a Leader in the IDC MarketScape for Midmarket ERP applications. This report is a guide highlighting the most important criteria for midsize companies to considers when selecting a system. Being named a Leader also underscores the value that Workday brings customers ranging from mid-sized business to the world’s largest enterprises.
Tags : 
market intelligence, midsize companies, global intelligence
    
Workday
Published By: Workday     Published Date: Mar 13, 2018
It’s important for services organizations to have a scalable ERP system that is easy to deploy and use. But figuring out which vendor best suits your specific needs can be a challenge. This IDC MarketScape report provides a look into the capabilities service organizations should expect from cloudenabled PSA ERP applications. Read an excerpt of the report to learn what it takes for an ERP system to lead your company into the future.
Tags : 
erp system, cloud, psa
    
Workday
Published By: Workday     Published Date: May 09, 2018
The 8th Annual CFO Alliance Sentiment Study surveyed more than 500 senior financial executives from public and private organizations across industries nationwide on anticipated challenges, focuses, and evolving landscapes of the C-suite and broader organizational hierarchy in the middle market. Read report.
Tags : 
    
Workday
Published By: Workday     Published Date: May 09, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape has put together a guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications.
Tags : 
    
Workday
Published By: Workday     Published Date: May 09, 2018
ERP Must-Haves for Finance: Leave behind cumbersome reporting, spreadsheets, and data that offers zero insights. IDC MarketScape has put together a guide to help you find the best finance and accounting applications. Read an excerpt of the report to learn today’s must-have ERP capabilities and why the IDC MarketScape positioned Workday in the Leaders category.
Tags : 
    
Workday
Published By: Workday     Published Date: May 09, 2018
: It’s important for services organizations to have a scalable ERP system that is easy to deploy and use. But figuring out which vendor best suits your specific needs can be a challenge. This IDC MarketScape report provides a look into the capabilities service organizations should expect from cloudenabled PSA ERP applications. Read an excerpt of the report to learn what it takes for an ERP system to lead your company into the future.
Tags : 
    
Workday
Published By: Applause Israel     Published Date: Jun 19, 2018
There’s no denying the effect digital has on the retail industry. $.56 of every $1 spent in physical stores is influenced by digital. What’s more, three of the world’s top five retailers are internetfirst: Amazon, Alibaba, and JD.com. According to PricewaterhouseCoopers’ Total Retail 2017 report, 56% of global shoppers use Amazon. Of these, 28% say they shop less often at retail stores because of Amazon. 18% say they shop less on other retailers’ e-commerce sites because of Amazon. And 10% say they shop exclusively on Amazon. Retailers need to find a way to compete in this changing retail landscape. These five global trends can provide some guidance on where retail is headed and how brands can thrive in this new era of retail.
Tags : 
    
Applause Israel
Published By: IBM     Published Date: Apr 25, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
b2c, ibm, order management, supply chain
    
IBM
Published By: Workday UK     Published Date: Mar 07, 2018
Learn why a new approach is needed. Read this whitepaper, “A New Approach to Audit and Control in Enterprise Software”, and discover more about the changing landscape of control and governance. Learn how rethinking technology can be the touchstone to separation of duties, transparent business processes and comprehensive auditing. Understand: •How the changing world of control and governance places new requirements on today’s finance systems •Why legacy systems with bolt-on finance controls fail to deliver complete compliance •How technology innovations help transform the finance function and reinforce control
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Mar 08, 2018
In the HR Outlook Report for Winter 2016/2017, brought to you by the CIPD in association with Workday, HR leaders discuss the priorities and challenges facing the function, both today and as we move into a business landscape which is anything but clear. Read the report and discover: • How HR leaders view their role in guiding their organisation through periods of economic and political uncertainty, such as Brexit • The uptake of analytics and big data to strengthen evidence-based decision making and the barriers preventing HR from adopting these technologies • HR’s priorities for 2017, and how these are shifting from 2016
Tags : 
    
Workday UK
Published By: Genesys     Published Date: Jun 11, 2018
Don’t let your communications system hold you back. PBX systems once provided top-of-the-line business communications, but they weren’t designed to accommodate business growth and change. And cloud-based platforms have altered the landscape of business communications. Your PBX isn’t just an inconvenience, it could hurt your business. This eBook covers common problems associated with PBX systems as well as their impact on your business. Learn to identify signs of trouble in your business communications as well as key features to look for in a new system. Don’t let a fear of the unknown hold you back. Download the eBook and learn: • Key warning signs to look for in your PBX • The impact of maintaining an outdated system • How modern communication tools can benefit your business
Tags : 
pbx, cloud, business communications
    
Genesys
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management.
Tags : 
idc, marketscape, agile, ppm, vendor, assessment
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.