post

Results 1 - 25 of 449Sort Results By: Published Date | Title | Company Name
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Entro il 2030, il mercato eolico offshore dovrebbe valere 30 miliardi di sterline all'anno. Passando rapidamente al 2050, si prevede che il settore contribuir per almeno un terzo alla fornitura globale di elettricit. Anche se questa una grande notizia per le aziende produttrici di energia elettrica, recenti ricerche hanno dimostrato che i costi associati alla manutenzione dei parchi eolici raddoppieranno tra il 2015 e il 2020. Assicurarsi un proprio posto nel futuro mix energetico, proteggere il valore e la potenza delle turbine eoliche attraverso una manutenzione efficace si riveler fondamentale per realizzare un vantaggio competitivo. Ci sono passi che possibile compiere ora, per ridurre i costi di manutenzione oggi e mantenerli bassi in futuro. Shell Omala S5 Wind 320 - olio per ingranaggi sintetico avanzato per turbine eoliche contribuisce a garantire un lavoro pi duro e pi lungo delle turbine eoliche, anche nelle condizioni pi difficili. Shell Omala S5 Wind 320 R
Tags : 
    
Shell U.K. Limited
Published By: Gigamon     Published Date: Sep 03, 2019
CyberEdge Groups sixth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this years report.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Groups sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organizations overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Securitys mos
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Darktrace     Published Date: Sep 04, 2019
Michael Sherwood, CIO of City of Las Vegas, explains how implementing Darktraces Enterprise Immune System with its autonomous defense capability fundamentally transformed his teams cyber security posture. Whether upstream, midstream, or downstream, Darktrace can be deployed to protect oil and gas production and transportation. Remote deployments on rigs can include local modeling and analysis, as well as central correlation for security monitoring of all assets. Darktrace appliances can support low-bandwidth and inhospitable environments through the use of ruggedized industrial probes. With Darktraces Industrial Immune System, the entire infrastructure is visualized and protected, including Industrial IoT and ICS.
Tags : 
    
Darktrace
Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo esto apostando muito em inteligncia artificial e machine learning para lhes dar a vantagem tecnolgica necessria para obter servios bancrios em tempo real, personalizados e preditivos. Um marco ajudar a diferenciar os primeiros ganhadores e fornecer vantagens contnuas em inteligncia. Faa o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo esto se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que voc conhecer: 8 tendncias que refletem o nvel de preparao do banco para a inteligncia conectada 9 armadilhas para evitar e 9 maneiras de pular os obstculos Os elementos bsicos pessoais, preditivos e em tempo real da IA e ML para os bancos Lderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso Orientao essencial do IDC para os bancos lderes
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo estn apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnolgica que necesitan para ofrecer servicios bancarios ms personalizados, predictivos y en tiempo real. Un marco ayudar a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitir conocer cmo los mejores bancos del mundo se estn volviendo ms personales, ms predictivos, y ms en tiempo real que nunca. Lo que usted conocer: Las ocho tendencias que reflejan el nivel de preparacin de los bancos para la inteligencia conectada Los nueve obstculos que evitar y las nueve formas de salvar las brechas Los elementos bsicos personales, predictivos y de tiempo real de la IA y el ML para los bancos Los lderes destacados de acuerdo con la investigacin de IDC Financial Insights y sus respectivos casos de uso Una gua esencial de IDC para los bancos lderes
Tags : 
    
TIBCO Software
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: SAP Hybris     Published Date: Oct 26, 2017
Supporting the Buyer Journey with Customer Service, which discusses the opportunity for customer service and support teams to improve the entire buyer experience through continuous pre and post-purchase engagement
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
For companies and buyers alike, customer service has traditionally been used as a troubleshooting tool. Forrester found that companies believe that nearly 50% of all buyers still view customer service as a post-purchase resource, rather than a purchasing aid, and in response, companies have positioned their customer service capabilities to match that expectation. However, Forrester conducted a custom survey of 247 companies and found that this reactive, postpurchase-only customer service mindset can result in missed sales opportunities and contributes to greater purchase dissatisfaction.
Tags : 
    
SAP Hybris
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their companys security posture against their peers.
Tags : 
    
HPE APAC
Published By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree pi a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360. Servono in media 23 giorni per riemergere da un attacco ransomware1, scopri perch una soluzione di sicurezza IT la risposta a questo problema. Scarica la guida alle soluzioni > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see whats on the horizon. Many clues are out thereand obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci stata fatta praticamente ogni domanda possibile sullargomento. Cos abbiamo pensato di riassumere le domande che ci sentiamo rivolgere pi spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformit al GDPR.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamais approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Workplace by Facebook     Published Date: Jun 17, 2019
Workplace connects everyone in an organization using familiar Facebook features like video calling, instant messaging, posts and groups. It works with other tools you already love, providing a simple and secure way for people to share knowledge, work together and build connected communities.
Tags : 
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Jun 26, 2019
To meet the work challenges of the future, business leaders need to create resiliency by connecting their employees. But they also need to make sure those employees are bought in to the strategy. Thats why the IC department has a huge role to play. Workplace connects everyone in an organization using familiar tools like instant messaging, posts and video calling. Weve identified six attributes that are critical to building connected organizations, and which act as the cornerstones for digital transform initiatives. Download this whitepaper to find out more.
Tags : 
    
Workplace by Facebook
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSAs Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadnt already done so. For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition. The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSAs concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that theyd achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: SAP SME     Published Date: May 09, 2017
As informaes descritas abaixo so teis para compreender o contedo deste white paper de proposta de valor. Elas fornecem detalhes sobre o objetivo e o escopo do artigo. As principais definies tambm so dadas para as sees selecionadas do artigo a fim de fornecer esclarecimentos adicionais.
Tags : 
    
SAP SME
Published By: Lenovo and Intel     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Todays technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: Mobile devices, tablets, and interactive technology improve the patient experience Healthcare facilities can remotely monitor patient progress and health post-discharge Providers can leverage patient portals and other tools to promote population health Ensuring patient engagement success requires effective measurement And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care, hospital to home, digital healthcare, power patient engagement
    
Lenovo and Intel
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace ONE is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.