sophisticated

Results 1 - 25 of 398Sort Results By: Published Date | Title | Company Name
Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses arent enough anymore. In todays rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Heres a total email-protection strategy that can help radically reduce an organizations susceptibility to attacks.
Tags : 
    
Barracuda
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCOs Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because youre in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer typesand get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO System of Insight with TIBCO BusinessWorks i
Tags : 
    
TIBCO Software
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Were living in the age of the customer, so its understandable that many companies are striving and claiming to be customer obsessed. yet many still fall short of creating superior customer experiences, even with sophisticated customer analytics in place, because of myopia and internal misalignment. The solution lies in a new customer insights paradigm: the next best experience (nBX). customer insights (ci) pros need to reevaluate their current analytics practices and embrace the nBX model to become truly customer obsessed.
Tags : 
    
Selligent Marketing Cloud
Published By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
    
Jamf
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Adobe     Published Date: Oct 22, 2019
Every organisation is at a different point in their progression with campaign management. Maybe youve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be youre a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know aboutand even some you dont
Tags : 
    
Adobe
Published By: ttec     Published Date: Jul 24, 2019
By the time most customers reach a human employee with a question, chances are they have already researched online or tried to self-serve. This means employee transformation is required to develop more sophisticated employees in the age of automation to solve more advanced customer issues. Because front-line jobs are becoming more complex, employees need to be tactical, technical, and ready to emotionally handle these new types of interactions. Recently, Lamont Exeter, head of Learning & Development at TTEC Digital, teamed up with Tim Duranleau of SAP Litmos in a webinar to discuss ways that companies can combine learning and technology to create more sophisticated employees. Below are some key highlights from the discussion.
Tags : 
    
ttec
Published By: Sift     Published Date: Jul 12, 2019
"In todays digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isnt additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift
Published By: Sift     Published Date: Oct 16, 2019
"In todays digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isnt additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
    
Sift
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Impervas WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Impervas sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web servers IP
Tags : 
    
AWS
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
security, cyber threat, cisco
    
Cisco EMEA
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally arent a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
    
Automation Anywhere APAC
Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the worlds leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your companys network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your companys network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With todays increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomesbut rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in todays digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If youre a small-to-midsized business (SMB), you know that youre operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure youre under. If you cant deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With todays increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jul 08, 2016
Todays threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. Its time for a new security model that addresses the full attack continuumbefore, during, and after an attack.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
This RSR custom research report explores the impact of omnichannel methods on merchandising, marketing and the supply chain; specifically, what analytical capabilities address the challenges that omnichannel selling and fulfillment pose for retailers. Consumers today routinely begin their shopping journeys online, but complete their purchases in nearby stores, in their home stores or delivered directly to their doors. Retail analytics enables organizations to capture data from their customers' journeys. Retailers that successfully deliver relevant omnichannel experiences while gaining a more sophisticated understanding of demand (where and how it is initiated) will enhance their brands value and create compelling and profitable customer relationships.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.