at

Results 26 - 50 of 39587Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Whether a CIO is on a four-year trajectory or has plans to stay much longer, there’s a way to thrive in this role as business priorities continuously evolve. I advocate producing early wins, setting sights on specific goals at specific points in time, and delivering on those goals whether you plan to be at a company for the long term or expect to move on soon after passing the four-year mark.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Over the next few years, chief information officers (CIOs) will preside over a maelstrom of change that will fundamentally alter the way their companies do business in the future.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
As the nature of work continues to evolve, modern organizations face an ever-changing set of challenges. The consumerization of IT and an increasingly mobile workforce have created a generation of workers who interact with data and information in entirely new ways. If businesses want to keep their footing in this new landscape, they must respond in ways that allow them to stay both flexible and secure.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
IT process automation can seem like a big step, but there are incremental ways to achieve improved efficiency that reduce risk and drive better business outcomes. The proper approach to automation can turbocharge your administrative teams, open new doors and provide the agility to respond to any business need. It’s the key to unlocking the power of cloud, and new service offerings make it more attractive to those looking to build the right IT business strategy for the future.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Digital transformation, through innovative customer experiences, is shaping the way organizations compete. Yet beyond introducing new technologies, winning businesses are vying for the best talent, leading to a rise in improving the digital employee experience, according to a new global survey.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Your BYO Strategy Isn’t Necessary Anymor
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Today, a great deal of work happens through devices, apps, and digital experiences—and people increasingly pay attention to those experiences as they decide where to work. That means IT is more important than ever in helping the business attract and retain great talent. When IT builds employee experiences that are streamlined and simple at every point—from onboarding to day-to-day tasks—they help ensure a workforce that is engaged, motivated and productive.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
It’s time to acknowledge that the tech industry has failed our customers when it comes to cybersecurity and data protection.
Tags : 
    
VMware
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, particularly Graham, Leach, Bliley (GLBA), the Payment Card Industry Data Security Standards (PCI-DSS) and the Sarbanes Oxley Act (SOX). Today, the General Data Protection Regulation (GDPR) is also top-of-mind, as it regulates not only the processing of personal data, including PII, relating to individuals in the European Union, for also any organization that processes personal data of EU residents. For United States banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer prot
Tags : 
    
CheckMarx
Published By: FICO EMEA     Published Date: Sep 12, 2019
Hay una proliferación de métodos de pago que nos proporcionan formas más rápidas de hacer y recibir pagos, pero todos no son iguales. Entender las diferencias y características únicas de los diferentes tipos de pagos "rápidos" es crítico para los equipos encargados de velar por el fraude en las transacciones. Descargue nuestro whitepaper para entender: • Las diferencias entre las transacciones en tiempo real, los monederos electrónicos y los pagos de persona a persona • Las implicaciones que las transacciones “rápidas” tienen sobre el fraude • Cómo planificar su estrategia Anti-fraude en las transacciones en tiempo real
Tags : 
transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
    
FICO EMEA
Published By: FICO EMEA     Published Date: Sep 12, 2019
La implantación de sistemas de pago en tiempo real ha supuesto ventajas tanto para las personas y las empresas como para los delincuentes. Los países que ya han adoptado sistemas de transacciones en tiempo real han experimentado un aumento del fraude, incluido el fraude APP -Authorised Push Payment- y el fraude por apropiación indebida -Account Takeover-, así como un aumento del blanqueo de dinero, en particular el uso de cuentas de mula. Este whitepaper analiza el impacto que las transacciones en tiempo real tienen sobre el fraude y examina los cambios en las estrategias Antifraude aportando soluciones para mantenerlo bajo control, incluyendo: - La necesidad de evaluar las transacciones en tiempo real para detectar fraude - Cómo proteger a los clientes de los fraudes en las transacciones push -El papel del Machine Learning en las estrategias Antifraude.
Tags : 
transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
    
FICO EMEA
Published By: Corrigo     Published Date: Sep 12, 2019
We’re living in a new era defined by data, analytics, and intelligence. It can sound overwhelming, but once you understand how to make all this information work for you, it becomes really exciting. The Intelligence Economy has already changed our day-to-day lives, and it’s revolutionizing the world of facilities management. The best FMs don’t just understand this change – they embrace it. With a better handle on intelligence, you will see immediate results. From warranty enforcement to asset repair vs. replacement decisions, Corrigo’s collective intelligence can improve your bottom line and make you better at your job. Read on to learn how Corrigo makes the Intelligence Economy work for you.
Tags : 
    
Corrigo
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
Starbucks’ Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Stratasys     Published Date: Sep 11, 2019
Reliable 3D Printing is Easier to Achieve Than You Think You’re ready to buy a 3D printer to enhance your business. You’ve done your homework and the benefits are clear: freedom of design, faster prototyping and reduced time-to-market, to name a few. The question is, what printer is best for your organization’s needs? Like so many things, you truly do get what you pay for. To get the most value from 3D printing, professionals need a printer that comes in not only at a good price point but can deliver quality results. Again and again. In this paper you will learn: The truth about 3D Desktop Printers Features and Benefits to look for in 3D Desktop Printers How to avoid the “Low Price” Trap
Tags : 
    
Stratasys
Published By: Stratasys     Published Date: Sep 11, 2019
FDM (Fused Deposition Modeling) provides a fast and accurate method of producing jigs and fixtures. FDM is an additive manufacturing process that builds plastic parts layer-by-layer using data from computer-aided design (CAD) files. By using FDM, the traditional fabrication process is substantially simplified; tool-making becomes less expensive and time consuming. As a result, manufacturers realize immediate improvements in productivity, efficiency and quality. Find out how the Oreck Corporation, a well-respected manufacturer of vacuum cleaners and other cleaning appliances, realized immediate savings in cost, production time and inspection time by implementing FDM for its fixtures.
Tags : 
    
Stratasys
Published By: MuleSoft     Published Date: Sep 11, 2019
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald’s, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security. Download this ebook to learn: How to unlock AI customer insights with an API strategy. How to make APIs the bedrock of IoT development. Why zero trust is key to API security in the new API economy.
Tags : 
    
MuleSoft
Published By: Anaplan     Published Date: Sep 11, 2019
Driver-based budgeting (DBB) is a business planning process that links demand with the operational activities needed to fulfill that demand. Its approach can be successfully implemented in nearly every industry due to its flexible methodology. In this paper, you will learn: What business drivers are and on which ones an organization should focus The benefits of implementing a DBB process How Connected Planning technology supports a sustainable DBB approach
Tags : 
    
Anaplan
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.