using

Results 1 - 25 of 2860Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institutes Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. Youll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institutes Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. Youll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institutes Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. Youll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institutes Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. Youll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institutes Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. Youll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: VMware     Published Date: Oct 12, 2018
With the benefits quickly stacking up, its easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to todays IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, its easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
    
VMware
Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware
Published By: VMware     Published Date: Oct 12, 2018
With nearly 20% of midmarket firms using Hyper Converged Infrastructure (HCI) and another 46% actively investigating and planning to adopt HCI solutions over the next 12-18 months, there has never been a more critical time to get ahead of your competition. Midsize businesses face the same need to modernize IT and embrace digital transformation as much as their larger competitors, but are typically restricted by resource and money. HCI enables midsize organizations to address these challenges with a solution that can grow as the business grows, without the financial burden or requiring to choose between on premise or public cloud solutions. The investments you make in IT technology and selecting the right HCI platform will impact your ability to evolve, grow and compete effectively in the future. Submit the form to read our latest whitepaper and discover how you can modernize IT and improve your midsize business operational efficiencies with vSAN.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
The implications of AIs unique approach are profound: AI can learn by example rather than through brute-force programming; can understand human intention and emotions and act accordingly; and can handle extraordinarily complex relationships of data that are beyond the capability of human analysts working alone. AI can multiply what we currently do and take us to experiences weve never had before, at a speed and scale that will change entire industries. In these case studies, were pleased to present a range of real-world examples to guide your imagination. Here, youll find situations where companies like yours found AI to be part of the solution. These examples show how AI can enhance an existing application, workflow or process and reduce friction. This e-book presents how 10 organizations are using artificial intelligence to accelerate decision making, improve business processes, enhance user engagement, reduce costs and drive remarkable growth and profitability.
Tags : 
cognizant, artificial intelligence
    
Cognizant
Published By: Vena Solutions     Published Date: Oct 29, 2018
With such proven and widely recognized benefits, how many companies are using rolling forecasts today? The short answer is, it depends on whom you ask. On the whole, adoption rates range from less than 5% to over 75%, depending on how you define a true rolling forecast.
Tags : 
rolling forecasts, financial forecasting, financial rolling forecast, business rolling forecasts, static budget, monthly forecast updates, quarterly forecast updates, driver based forecasts, vena solutions
    
Vena Solutions
Published By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google
Published By: Workday UK     Published Date: Sep 18, 2018
People analytics is increasingly on the agenda for organisations. With the rise of workplace technology allowing leaders to track employees performance, productivity and wellbeing, we partnered with the CIPD to survey over 3,000 business professionals to understand how people analytics is being used. And the results are in. 65% of respondents who work in an organisation with a strong people analytics culture, say their business performance is strong compared to competitors. As well as outlining the key opportunities leaders can capitalise on, this report covers: - How different professions are using people data - The various types of people data that are being used - How people analytics adds value to organisations - What the future holds for people data
Tags : 
    
Workday UK
Published By: Evariant     Published Date: Nov 08, 2018
Smarter growth for healthcare providers requires a strong patient acquisition engine that can demonstrate ROI. By focusing on the financial impact of marketing efforts, healthcare marketers demonstrates why these efforts warrant further investment. This guide presents the Evariant approach to calculating service line ROI from marketing spend. It includes a standard set of formulas and optional factors that may be relevant to certain service lines and system-wide operations.
Tags : 
healthcare marketing, marketing roi, patient acquisition, marketing measurement
    
Evariant
Published By: Monetate     Published Date: Oct 11, 2018
Monetate Intelligent Recommendations is the only solution that gives merchandisers & digital marketers the power to show contextually relevant product recommendations without burdening IT resources. Using manually curated or algorithmically-driven recommendations, marketers can easily support even the most complex product catalogs. Our solution filters recommendations based on customer attributes (e.g. shirt size), longitudinal behaviours (e.g. browsing behaviour), and situational context (e.g. product inventory at local stores). Best of all, an orchestration layer intelligently selects which algorithms and which filters to apply in any given situation, for any particular individual.
Tags : 
    
Monetate
Published By: Here Technologies     Published Date: Oct 16, 2018
In this report, VSI applies HEREs HD map data to a lane keeping application and examines performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach. VSI tested the lane keeping system with and without map data on a local road in 3 scenarios: Lane lines expanding into a turn or exit lane An intersection without lane lines A widening in the lane The results show that in all scenarios, the computer-vision-only lane keeping systems got confused and made errors in a vehicles trajectory when lane markings were out of the ordinary or invisible. Faced with the same road conditions, the map-based lane keeping system stayed within the desired trajectory outperforming the compute- vision-only systems. This report proves that using a lane model from an HD map can solve common issues involved in computer-vision-only lane keeping.
Tags : 
    
Here Technologies
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victims data until the extortionists demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Dassault Systmes     Published Date: Jun 19, 2018
The concept of a virtual, digital equivalent to a physical product or the Digital Twin was introduced in 2003 at a University of Michigan Executive Course on Product Lifecycle Management (PLM) taught by Dr. Michael Grieves. In light of these advances, it is timely to explore how the Digital Twin can move from an interesting and potentially useful concept that aids in understanding the relationship between a physical product and its underlying information to a critical component of an enterprise-wide closed-loop product lifecycle. Understand how focusing on the connection between physical product and virtual product will improve productivity, uniformity of production, and ensure the highest quality products.
Tags : 
    
Dassault Systmes
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development, business intelligence, project management, database development, web development
    
Black Duck Software
Published By: Datastax     Published Date: Nov 02, 2018
Most enterprises operate in a hybrid cloud environment, whether they know it or not. The benefits of hybrid cloud and multi-cloud architectures are numerous, but since most companies dont even realize theyre using multi-cloud, theyre not taking full advantage of the multi/hybrid cloud environment. Read this ebook to learn how proper data management via an enterprise data layer empowers enterprises to unlock the full potential of their multi- and/or hybrid cloud strategies to achieve data autonomy while scaling efficiently, effectively, and safely.
Tags : 
    
Datastax
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.