Share us:
 

data visibility

Results 1 - 25 of 182Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs provide supply chain stacks and applications with: Greater agility Contextual intelligence Real-time data implementation Speed Scale Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Esker     Published Date: Jan 08, 2019
Customer service is, was and always will be a top priority for companies. But today’s digital age has given rise to a new kind of customer with far different expectations — making customer service more complex than ever. Here’s the good news: By aligning People, Process & Technology (PPT), you can not only meet these new expectations, but exceed them by providing a more personalized and proactive customer experience. In this ePaper, you’ll learn how order processing automation helps you: • Create a more engaged, empowered staff • Eliminate low-value tasks like data entry • Provide 100% visibility into every order processed
Tags : 
    
Esker
Published By: Cisco     Published Date: Mar 22, 2019
Be proactive in protecting your data center with complete visibility, multilayered segmentation, and threat protection that follow the workload everywhere.
Tags : 
    
Cisco
Published By: Sage     Published Date: Nov 26, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work are changing. Employees are more diverse, mobile and technologically savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything from attracting and keeping the best talent to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better and
Tags : 
    
Sage
Published By: Nextgen     Published Date: Aug 08, 2017
Meditouch helps integrate patient engagement across your practice and the care continuum. Foster patient satisfaction and achieve front office efficiency. YourHealthFile patient portal for convenience, transparency, and communication. Patient-generated data alleviates staff burnout via manual duties; prevents bottlenecks. Easily refill Rx, reduce no-shows, quickly fill cancellations. iPad functionality supports education and doctor patient relationship. Garner better reviews, gain more online visibility, market your practice to new patients.
Tags : 
patient engagement, patient care, healthcare, patient communication
    
Nextgen
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 22, 2019
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
    
TIBCO Software GmbH
Published By: Sage People     Published Date: Jan 04, 2019
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people
Tags : 
    
Sage People
Published By: Sage People     Published Date: Jan 22, 2019
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals. The survey revealed that: • It’s the war for talent, again. The greatest challenges for growing companies are winning the war for talent, growing productivity and improving workforce visibility. • Fast-growth companies share common traits in the way they manage and engage their people—we call this being a People Company. • There’s a disconnect between managers and employees in terms of what being a People Company means. • Becoming a People Company is a journey, with many organisations some way from embracing all aspects. • People Science is a thing: there’s an appetite to leverage people data and analytics, but there are blockers in the way. Re
Tags : 
    
Sage People
Published By: Sage EMEA     Published Date: Dec 19, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better an
Tags : 
    
Sage EMEA
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Riverbed     Published Date: Jul 17, 2013
How to effectively troubleshoot your VDI deployment Virtual desktop infrastructure has come a long way since the first steps were taken a decade ago to run desktop workloads in the data center. While more pervasive today, VDI technologies are latency-sensitive, and wholly dependent on the network. Complaints of poor end-user experience persist, especially over the WAN at branch offices where bandwidth constraints and latency delays are common. But there is a way to ensure consistent and reliable VDI performance to deliver: Reduced downtime Faster troubleshooting Improved SLAs Enhanced planning and control Read this brief to learn how the Riverbed® Cascade® application-aware network performance management (NPM) solution unlocks VDI visibility.
Tags : 
virtual desktop, infrastructure, deployments, cascade, riverbed, local area networking, network architecture, network management, network performance, network performance management
    
Riverbed
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s adaptive enterprises have to leverage data to remain flexible and responsive, but they need the right data. But it isn’t easy: Many companies struggle to improve technical execution while maintaining the visibility executives need. That’s why we created CA PPM + CA Agile Central, a seamless integration of our agile-management and business-portfolio management solutions. Together, they provide unparalleled visibility into both funding and work across every level of your organization.
Tags : 
funding, increment, planning, value, roadmap, agile central, ca technologies
    
CA Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the network’s edge. You need visibility, perspective and an innate sense of when things just don’t seem right.
Tags : 
ibm, qradar, cloud, analytics, flexibility, scalability, organization
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service