ber

Results 1 - 25 of 3893Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your companys network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your companys network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last years study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This years research updates those findings and explores the benefits associated with privacy investment. Ciscos Data Privacy Benchmark Study utilizes data from Ciscos Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: 3D Systems     Published Date: May 15, 2019
Feinguss ist eine przise Fertigungsmethode, die in vielen Branchen fr Werthaltigkeit sorgt von mechanischen Teilen in der Automobil-, Luftund Raumfahrtindustrie bis hin zu aufwendigen Zahnbehandlungen, Schmuck und Skulpturen. Jahrhundertelang waren hohe Kosten und lange Vorbereitungszeiten fr Gussmodelle die Voraussetzung fr einwandfreie und hochwertige Feingussteile. In vielen Branchen erfolgt die Entwicklung neuer Teile inzwischen drastisch schneller. Dies ermglicht verkrzte Produktlebenszyklen und kleinere Produktionsmengen fr Gussteile zwischen den einzelnen Zyklen. Es kostet Zeit und Geld, wenn sich Reparaturen an alternden Flugzeugen verzgern, weil Werkzeuge fr verbrauchte Teile erst nach langen Wartezeiten verfgbar sind. Der Bedarf an schneller verfgbaren Gieereiprodukten nimmt in allen Branchen zu, und Gieereien mssen in der Lage sein, auf die verstrkte Nachfrage zu reagieren.
Tags : 
    
3D Systems
Published By: Global Payments     Published Date: May 02, 2019
We live in an age of unrivaled ecommerce opportunity. The number of new internet users is climbing by 248 million each year, equating to 7% annual growth. That figure in turn is dwarfed by booming ecommerce rates, which average out at 14% globally. This report offers an overview of ecommerce markets across the globe, summarizing the current situation, and identifying the most effective ways to nurture business - and the customer experience - on a local and global scale.
Tags : 
ecommerce growth, global payments, local language, localization, retail, mobile payments, alternative payment methods, chinese wallets, alipay, wechat pay, global commerce, international payment solutions
    
Global Payments
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel to learn more.
Tags : 
    
Dell EMC
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions matched with flexible rules-based fraud strategies. Detect fraud more accurately with robust data and insights on ever-changing fraud patterns Protect your bottom line by reducing fraud and chargebacks Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data and more.
Tags : 
    
CyberSource
Published By: Dell EMC     Published Date: May 29, 2019
Ulrike Rger, Sales Director and Head of Business Unit Client Solutions bei Dell Deutschland, spricht ber die Chancen der Digitalisierung fr den deutschen Mittelstand und erklrt worauf es bei dem Weg in die digitale Zukunft ankommt. Unsere Lsungen fr den Mittelstand finden Sie hier: https://www.dellemc.com/de/Mittelstand Windows 10 Pro ist genau das Richtige fr Unternehmen
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Jun 05, 2019
Keine Frage: Der deutsche Mittelstand ist Meister seines Fachs. Als Inno vations- und Technologiemotor erfreut er sich zu Recht internationaler Wertschtzung, und so wundert es nicht, dass die mittelstndische Wirtschaft boomt. Das Potenzial der Digitalisierung schpfen die Unter nehmen allerdings noch lange nicht aus. Ulrike Rger, Chefin des PC-Geschfts von Dell Deutschland, spricht im Interview ber die Trans formation der IT und den Arbeitsplatz der Zukunft. Windows 10 Pro ist genau das Richtige fr Unternehmen
Tags : 
    
Dell EMC
Published By: Schneider Electric     Published Date: Jun 07, 2019
Volverse ms eficiente y ms confinable.Para llevar ventaja sobre la evolucin de los centros de datos, las empresas necesitan considerar el monitoreo remoto digital. Este informe explica cmo el monitoreo remoto digital afectar estas reas: Mejoras en el costo y el rendimiento de sistemas integrados Ciberseguridad Computacin en la nube Anlisis de macrodatos Computacin mvil Aprendizaje automtico Automatizacin para rendimiento laboral.
Tags : 
ciberseguridad, computacin mvil, colocacin
    
Schneider Electric
Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get Scaling Inline Threat Prevention Tools to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, because thats where the money is. While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes that is, botscan now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Rackspace     Published Date: May 06, 2019
The retail sector is increasingly difficult and volatile. Enterprises must adopt easily available technology to liberate themselves from the daily grind and better focus on achieving their core business objectives. To be cost-effective in doing this, retailers turn to Google Cloud Platform, the most affordable, reliable, innovative and intuitive cloud platform in the world, to drive operational agility and optimization of application performance. As the first managed services partner for Google Cloud Platform, and Google Clouds 2018 Global Migration Partner of the Year, Rackspace is helping retailers everywhere to accelerate innovation and cost savings, by taking over their intensive, day-to-day operations of the cloud. This e-book looks at how different retail brands work with Rackspace to ensure smooth and easy migration and operation on Google Cloud, as well as to gain added value from Rackspaces depth of knowledge and best practices to effectively tap Google Cloud Platform too
Tags : 
    
Rackspace
Published By: Gigamon     Published Date: Feb 20, 2019
Arrtez de dployer des outils de prvention des cybermenaces en mode dtection. Procurez-vous Dimensionner les outils de prvention des menaces inline pour dcouvrir les avantages d'une architecture de protection inline. Lisez maintenant.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the 2019 Cyberthreat Defense Report now to learn how IT security pros plan to address these challenges. Youll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; its the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
locator, uberall, store locator, location marketing, local listings
    
Uberall
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesnt need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: Uberall     Published Date: Apr 12, 2019
Ein Online-Filialfinder ist einer der wichtigsten Bestandteile Ihrer Website. Er sorgt dafr, dass Online-Suchende zu Offline-Kunden werden. Die Voraussetzung: Ein optimales Nutzererlebnis. Wir haben die 10 Schlsselfaktoren zusammengestellt, die Ihren perfekten Filialfinder ausmachen.
Tags : 
locator, uberall, store locator, location marketing, local listings, filialfinder, lokale standortseiten, ropo
    
Uberall
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.