worldwide

Results 1 - 25 of 400Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system linking those with money to invest with enterprises and activities that require funding is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of external voices demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms mindset and investment offerings is required.
Tags : 
    
KPMG
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todays assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion recordsa large majority of which included usernames and passwords.1 This wasnt new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials arent stolen just for funthey are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are botsmalicious onesbecause they enable cybercriminals to achieve scale. Thats why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
Application development has become core to business success. As a result, application developers have emerged as precious assets not just inside their companies, but across the global economy. According a report from Stripe, these developers have the potential to collectively raise worldwide GDP by $3 trillion over the next decadewhich is why keeping them productive and professionally fulfilled is more important than ever
Tags : 
    
Amazon Web Services EMEA
Published By: Workday APAC     Published Date: Oct 07, 2019
Retailers worldwide are finding success in the cloud. Check out this blog to learn how smarter back-office technology can help you better attract, engage, and retain your workforce.
Tags : 
    
Workday APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infrastructure efficiency and effectiveness directly support profit and growth as competition increases in the cloud and managed service provider (xSP) market. Savvy service providers understand that storage choices have a profound impact on not only their profit and growth, but also on their customer experience and retention. They also know that storage challenges in all those areas increase exponentially with scale. Infinidat storage platforms allow service providers to build and scale differentiated, profitable solutions without worrying about storage. Infinidat technology enables unprecedented efficiency, performance, and resiliency, while flexible business models make it easy for service providers to operationalize those platform advantagesincluding unique co-branding and promotional opportunities as part of the Powered by Infinidat program. Cloud providers worldwide trust their businesses to Infinidat storage. This paper explores a path for service providers to unlock greater sc
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive hunting for Indicators of Attack (IoA) and reactive sweeping for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
    
Trend Micro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: Adobe     Published Date: Sep 23, 2019
No matter where they are, your customers expect you to be there too, offering fluid, consistent experiences across channels SUPPORTING CONCEPTS: Customer choices continue to expand - 5.5 million new smart things are connected every day, and by 2020, Gartner predicts there will be 20.8 billion connected things worldwide. 76% of marketers agree that personalization is driving increased need for more assets. 88% of marketers agree that they need an easier way to discover and share assets that generate the best engagement. With a hybrid content and experience solution, Synopsys saw: o A 40% increase in productivity o Reduction from 2 weeks to 2 hours to restructure content WHY SHOULD THE TARGET AUDIENCE CARE? Companies need to transform their businesses to meet the demands of customers in an omnichannel world.
Tags : 
    
Adobe
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application integration, application performance management, business activity monitoring, business process automation, business process management, analytical applications
    
ASG Software Solutions
Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, configuration management, database development, web service management
    
Zynapse
Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance, mdm, master data management, odm, mmdm, material, eprocurement, business intelligence, database development, data integration
    
Zynapse
Published By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Cisco     Published Date: Jan 03, 2019
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's chances for present and future success worldwide. This study assesses the capability and business strategy of 12 global enterprise videoconferencing vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise videoconferencing solutions, for both the short term and the long term.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices smartphones and tablets provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Microsofts SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint.
Tags : 
third-party, access, sharepoint, platform, remote, enterprise
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Advanced Technology is having a growing impact on our everyday lives. Adoption of advanced technologies and virtual assistants such as Amazon Echo and Google Home are becoming more mainstream in homes. Meanwhile organizations worldwide are increasingly looking at how to implement similar technologies to improve productivity, speed workflows, and increase collaboration among employees, business partners, and even customers. To date, little is known about perceptions of technologies such as artificial intelligence (AI) and virtual assistants in the workplace and how they will impact how we work in the future.
Tags : 
technology, customers, enterprise, business
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 08, 2018
You want your business to grow. Be profitable. And stay competitive. Having a robust network is key to your success. Cisco is the worldwide leader in technology. Our SMB portfolio delivers the reliable, scalable, and highly secure IT infrastructure that your business needs. Staying ahead of market trends is vital to the success of your business. Cisco can help keep your business on the move while helping to secure your data, devices, and infrastructure. To find out how, download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Workplace by Facebook     Published Date: Jun 13, 2019
Today, over 30,000 organizations worldwide are using Workplace to build community.
Tags : 
    
Workplace by Facebook
Published By: Cherwell Software     Published Date: Apr 07, 2016
B/E Aerospace is the worldwide leading manufacturer of aircraft passenger cabin interior products and the leading global distributor of aerospace fasteners for commercial, business jet, and military markets. The company has leading worldwide market shares in all major product lines and serves virtually all of the worlds airlines, aircraft manufacturers, and leasing companies through its direct global sales and customer support organizations. Headquartered in Wellington, Florida, B/E Aerospace has grown to nearly 12,000 employees and 220 sites around the world and a true follow-the-sun model for global customer support.
Tags : 
best practices, customer support, business intelligence, business optimization, business management
    
Cherwell Software
Published By: Cisco     Published Date: Feb 23, 2016
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of 12 of the top enterprise wireless LAN (WLAN) vendors.
Tags : 
wireless, marketplace, business strategy, network performance, best practices
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.