singapore

Results 1 - 25 of 56Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way todays modern business operates. Theyve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware. While malwares pervasiveness may not come as a surprise to many people, whats not always so well understood is that automating app attacksby means of malicious bots is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todays assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: Netsuite     Published Date: Dec 08, 2016
Read this Frost & Sullivan survey report of 1,500 senior executives across a range of industries in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US) to understand whats driving rapid industry transformation from digitalization, globalization to cloud computing. Learn how cloud computing has emerged not just as a cause of change but increasingly as a necessary response providing the flexibility and adaptability thats key to survival.
Tags : 
cloud computing, erp, digitalization
    
Netsuite
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you cant see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what theyre doing. But visibility, by itself, isnt enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrows threats, and SSL Orchestrator is the tool that lets your security controls keep your organizations name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. Its become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interactionwebsite visits, API calls to mobile apps, and othersis being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But thats not all: theyre also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiencesperhaps a chatbot provides instant customer assistance on your site. Whats important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by todays digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. Its all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todays assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion recordsa large majority of which included usernames and passwords.1 This wasnt new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials arent stolen just for funthey are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are botsmalicious onesbecause they enable cybercriminals to achieve scale. Thats why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
According to the 2018 Global DNS Performance Benchmark Report, the state of DNS resiliency among enterprises and top SaaS providers is poor, with 60% relying on a single source for their authoritative nameservers. In this article, well explore the necessity of having a secondary DNS service.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployedits deployed on a frequent basis.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, because thats where the money is. While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes that is, botscan now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) such as customers credit card details, user account passwords, corporate sales and payroll data, etc. before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapores largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace
Published By: Amazon Web Services EMEA     Published Date: Apr 16, 2019
By placing the future of transportation in the cloud, governments can improve the performance of technology infrastructure and focus on delivering innovative services to citizens, without increasing costs. You can start that journey today. In this eBook, you will learn about: Life-saving digital initiatives on US streets Valuable data insights across UK airports Scalable ticketing services for Turkeys Istanbul Deniz Otobsleri ferry passengers Cost savings for Singapores Land Transport Agency Scalable, secure innovation at speed
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
To understand the degree to which organisations are experiencing industry change globally and how they are responding, Frost & Sullivan surveyed 1,500 senior executives (CEOs, CFOs, CIOs and other senior managers) in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US). Respondents spanned all major industry sectors, ranging from manufacturing to retail. The research shows that most executives not only agree that their industry is rapidly undergoing transformation, but that ?exibility and adaptability are increasingly becoming key factors for survival.
Tags : 
cloud computing, industry transformation, business executives, flexibility and adaptability, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: NetSuite     Published Date: Feb 17, 2016
Frost & Sullivan surveyed 1,500 senior executives (CEOs, CFOs, CIOs and other senior managers) in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US). Respondents spanned all major industry sectors, ranging from manufacturing to retail. The research shows that most executives not only agree that their industry is rapidly undergoing transformation, but that flexibility and adaptability are increasingly becoming key factors for survival.
Tags : 
industry change, retail, manufacturing, flexibility, adaptability
    
NetSuite
Published By: IBM     Published Date: Jun 25, 2018
As Singapores largest insurance force, Prudential Singapore needed a scalable and cost-effective solution to help financial consultants respond quicker to in-depth product and policy questions. Partnering with IBM, they developed askPRU, an industry-first chatbot with IBM Cloud and Watson capabilities. Handling over 1,000 commonly asked questions in real-time, askPRU reduced call volume by 32% within six months and enhanced the responsiveness of over 4,600 consultants. Enabling consultants to focus on more complex queries, askPRU also provides accurate expertise to help deliver consistently exceptional service. Learn how Watson technology became central to the Prudential Singapore business and enhanced their customer experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions time to market.
Tags : 
    
IBM
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
The cooling measures announced by the government on 5 July threw the residential market into a frenzy. Within a span of five hours, over 1,000 units were sold from three new projects as buyers rushed to beat the midnight deadline to avoid paying the new higher Additional Buyers Stamp Duty (ABSD) rates. The 1,000 units came from three projects that were launched that night: over 500 units from Riverfront Residences in Hougang, around 300 units from Park Colonial at Potong Pasir and some 200 units from Stirling Residences in Queenstown. For the rest of the quarter, response to new launches was patchy as potential home buyers weigh affordability with opportunity cost. The residential price index edged up by a mere 0.5% q-o-q, a far cry from rises of 3.4% in Q2 and 3.9% in Q1. This moderate price increase shows that the key objective of the cooling measures, which is to achieve a more gradual but sustainable price growth, has been met. Download the full report to Learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.