Share us:
 

test

Results 1 - 25 of 2268Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: 3D Systems     Published Date: May 14, 2019
For more than two centuries, industrial factory production has excelled in four key aspects: repeatability of the process, durability of parts produced, productivity of the workflow, and an economical total cost of operation. Factory workflows have been optimized to produce the best possible parts in volume, as inexpensively as possible. Any new production method or workflow process that hopes to be accepted alongside this standard process must meet or improve on these time-tested elements. To learn more, download this whitepaper today.
Tags : 
    
3D Systems
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Die INFINIDAT® Enterprise-Storage-Lösungen basieren auf der einzigartigen und patentierten INFINIDAT Speicherarchitektur - Ein vollständig abstrahierter Satz von Software-De?ned Storage (SDS)-Funktionen wird mit der besten Standard-Hardware integriert. Mit dem Versand der Software liefert INFINIDAT eine ausgiebig getestete Hardware-Referenzplattform mit. Damit stellt INFINIDAT die ersten echten SDS-Lösungen der Enterprise-Klasse bereit.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Les solutions de stockage d’entreprise INFINIDAT® sont basées sur l’architecture de stockage exclusive et brevetée INFINIDAT, une couche d’abstraction logicielle des fonctions de stockage déployée sur des équipements matériels bon marché. En commercialisant le logiciel avec une plateforme matérielle de référence testée, INFINIDAT propose la première véritable solution de stockage dé?ni par logiciel pour entreprise.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Le soluzioni enterprise di INFINIDAT® sono basate su un’architettura di storage unica e brevettata INFINIDAT – Un insieme completo di funzioni di software-de?ned storage (SDS) integrate con il migliore hardware commerciale presente sul mercato. Attraverso l’integrazione del software con una piattaforma hardware di riferimento ampiamente testata, INFINIDAT fornisce la prima vera soluzione SDS di classe enterprise.
Tags : 
    
Infinidat EMEA
Published By: Kestra Financial     Published Date: May 30, 2019
ndependent advisors make up one of the fastest growing segments in the financial services industry. If you’re curious about breaking free, you may want to consider these advantages that independent advisors can offer their clients
Tags : 
    
Kestra Financial
Published By: FM Global     Published Date: Jun 10, 2019
From wildfires to hurricanes, nobody is immune to natural disasters. Our latest report, "Master the Disaster," is an in-depth look at the often unexpected high costs that come from a wide range of catastrophes. The first step toward resilience is understanding your risk, so download our full report today.
Tags : 
    
FM Global
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
    
Zscaler
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: MuleSoft     Published Date: Apr 23, 2019
In today’s competitive landscape, businesses need to make decisions quickly in order to respond to rapidly changing customer preferences and nimble competitors; whether it’s a new business strategy, a new business process, or a new market offering, businesses are competing on speed and agility. The overwhelming majority of today’s business and IT leaders understand digital transformation is necessary to maintain leverage amid constantly changing customer preferences. They also have a clear picture of their desired end state—exemplified by leaders like Amazon, Google, and Microsoft. However, only a small minority of have a clear understanding of the path they need to lead the market. In this paper you’ll learn: How to build digital transformation into the root of your company with a practical, natural, and tested blueprint. Best practices from over 1,600 enterprises to transform your strategy, organization, and technology from the ground up. Actionable next steps to start your journ
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: PRQA     Published Date: Feb 26, 2013
This paper discusses the thinking and motivation which has led to the publication of the latest version, MISRA C:2012
Tags : 
    
PRQA
Published By: Airfoil PR     Published Date: Apr 21, 2010
In our latest Point of View, "The Dirtiest Word In Business," Airfoil has assembled a collective set of best practices to help technology marketers meet the communications challenges of a new digital decade.
Tags : 
airfoil, innovation, pov, public relations, integration, communications
    
Airfoil PR
Published By: test     Published Date: Aug 10, 2011
test
Tags : 
    
test
Published By: AppAssure Software     Published Date: Jun 29, 2010
Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery, servers, backup and recovery, storage management, security management, security policies, server virtualization, microsoft exchange
    
AppAssure Software
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design
    
OneUpWeb
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing, software compliance
    
Harry lei
Published By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
    
Cibecs
Published By: Global Voice & Data     Published Date: Feb 14, 2013
The Shortest Telecomm White Paper Ever Written!
Tags : 
business internet, internet access, isp, internet service provider, dedicated internet access, telecommunications
    
Global Voice & Data
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service