detect

Results 151 - 175 of 783Sort Results By: Published Date | Title | Company Name
Published By: Riskified     Published Date: Aug 06, 2019
Legacy fraud detection systems often approve or decline orders based solely on a handful of order details. Modern solutions are far more sophisticated, instantly considering hundreds of data points for each order, resulting in more accurate decisions. Savvy merchants expect much more from their fraud management solutions than simply a risk score.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
Online fraud is becoming more and more sophisticated, as cybercriminals try and keep a step ahead of fraud solutions and tools. One of the results of this arms race is the recent surge in ATO – account takeover – attacks, a form of fraud which is particularly difficult to detect. In 2017 ATO led to $5.1 billion in losses, a staggering 122% increase over the $2.3 billion lost in 2016.
Tags : 
    
Riskified
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel
Published By: Intel     Published Date: Dec 13, 2018
Advanced image analysis and computer vision are key components of today’s AI revolution and is becoming critical for a wide range of industry applications, including healthcare, where this technology is being used to detect anomalies and improve patient care. Due to a lack of integrated tools and experience with these cutting-edge technologies, however, deploying complete systems is difficult. Applications that utilize deep learning approaches often require large amounts of highly parallel compute power, storage, and networking capabilities, along with performance optimizations for faster data analysis. The Intel and QNAP/IEI solution combines all these elements in one complete system for scalable data management for hospitals and clinics of all sizes. Read more on Intel’s and QNAP/IEI’s real-world use case on macular degeneration analysis through high-performance computing, vision capabilities, storage, and networking in a single solution.
Tags : 
    
Intel
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
The Scandinavian commercial vehicle manufacturer wanted better uptime and reduction of vehicle on road (VOR), and also provide real-time feedback and visibility to their customers. LTI helped streamline analytics to detect exceptions and create actionable and achievable high scalability with microservices and serverless architecture. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: HERE Technologies     Published Date: Mar 01, 2019
OEMs today face significant challenges that restrict effective fleet analysis. Data is often siloed and held in several incompatible formats, meaning responding to software faults can be a costly and lengthy process. To overcome this, Here have combined OTA technology with the HERE Open Location Platform. By closing this loop, Here provide a one-stop solution for data enrichment and analysis – and Here turn connected vehicle data into over-the-air updates. Watch this webinar and learn how HERE enables: • Early error detection and proactive remote maintenance of software and firmware • Reduction of data management value chain complexity with its one-stop solution • Effective fault response and real-time access to new products and services
Tags : 
location data, auto, over the air technologies
    
HERE Technologies
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Concur     Published Date: May 07, 2012
Download our full Benchmark Report 2012 analysis and learn best practices on how your business can ensure money is not leaking away undetected.
Tags : 
concur, finance, business, travel and expense management, budget
    
Concur
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
it security, it security investments, cyber threats, malware detection, it management, knowledge management
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
it security, cyber threats, threat detection, it management, knowledge management
    
Kaspersky Lab
Published By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Dell Software     Published Date: Oct 03, 2013
Download Dell’s Market Insight report, CIO’s View of Application Performance Management, and learn how APM technologies boost productivity, detect performance issues early and reduce time to market.
Tags : 
management solution, mobile applications, performance monitoring, apm, dell foglight, technology, knowledge management, data management
    
Dell Software
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.