dec

Results 1 - 25 of 3123Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales.  Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, unified commerce, payment convenience, global payments technology, e-retail, pos technology
    
Global Payments
Published By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon EMEA
Published By: Rackspace     Published Date: May 09, 2019
Insights into avoiding migration regret amongst CxO’s: The decision to move business workloads and applications to the cloud impacts all parts of the business and isn’t a decision isolated to the IT team. Our latest research study on the different motives, concerns and experiences of executive peers and business stakeholders when securing buy-in for a strategic IT move found 97% of C-level executives in ANZ suffered from migration regret during their first cloud migration. Packed with telling hindsight, over 200 c-suite executives shared their expectations and experiences during the cloud migration journey. They reveal what they would have done differently - namely enhanced communication and a clear plan of action - and offer practical advice to help others get buy-in internally and secure funding to support a move to the cloud.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 09, 2019
Closing the communication gap around security and digital transformation: According to a recent report, 95% of CIOs expect cyber-threats to increase over the next three years. But, despite cybersecurity being front of mind for board members and IT decision-makers, many admit they do not have an appropriate security strategy in place. In this eBook we will: • Discuss why organisations do not have a strategy in place for cybersecurity, despite the board and ITDMs recognising it as a key priority • Explore the challenges ITDMs face communicating with the board about organisational priorities and skills disconnect • Reveal what ITDMs can do to help close the looming 'security strategy gap' that is widening day by day, and could be detrimental to the organisation's cloud security Download our eBook now to learn how to close the security gap in your organisation.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Here Technologies     Published Date: Mar 29, 2019
By making use of the right technology, transportation and logistics (T&L) companies can reinvent their industry with superior customer service, increased revenues, and reduced costs. This whitepaper looks at the obstacles facing the T&L industry and examines how fleet planning and trip analysis software businesses can help by enabling faster and smarter data-driven decision-making. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE can help T&L companies improve fleet management.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organization’s data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organization’s approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
One of the biggest changes faces organizations making purchasing and deployment decisions about analytic databases -- including relational data warehouses -- is whether to opt for a cloud solution.
Tags : 
    
Group M_IBM Q2'19
Published By: Bluecore     Published Date: Sep 18, 2018
Email marketers have always dreaded the unsubscribe, and at the cost of nearly $18 or more per unsubscribe depending on your average order value, it’s clear why. Altogether, the cost of an unsubscribe -- in terms of lost revenue potential and associated soft costs — is nothing to blink at. Fortunately, there are several steps you can take to decrease your unsubscribe rate and recover some of that otherwise lost revenue.
Tags : 
unsubscribe, email marketing, email roi
    
Bluecore
Published By: Bluecore     Published Date: Oct 23, 2018
If you’re not one of those retailers, you’re likely busy playing catch-up to them – and that’s not a position in which anyone wants to be. Since eCommerce began, a small handful of leaders have set the pace. They’ve innovated quickly and delivered incredibly valuable and convenient shopping experiences. And in doing so, they shaped consumer expectations. Take Amazon. Over a decade ago, the online giant seemingly rewrote the natural laws of retail by managing to deliver more, better, faster – all with unmatched accuracy and ease. Now, consumers expect an Amazon-like experience everywhere they shop, and anything else feels subpar.
Tags : 
email marketing, personalized email, retail marketing
    
Bluecore
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: Equinix APAC     Published Date: Apr 22, 2019
To meet growing demand for multiple public cloud services, enterprises must shift away from an ad hoc approach of incrementally connecting to one cloud provider after another. For a more strategic approach, I&O leaders must weigh their cloud connectivity decision against five critical criteria.
Tags : 
    
Equinix APAC
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.