cio report

Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
Application development has become core to business success. As a result, application developers have emerged as precious assets not just inside their companies, but across the global economy. According a report from Stripe, these developers have the potential to collectively raise worldwide GDP by $3 trillion over the next decadewhich is why keeping them productive and professionally fulfilled is more important than ever
Tags : 
    
Amazon Web Services EMEA
Published By: TIBCO Software     Published Date: Sep 16, 2019
Para la mayora de los equipos de operaciones de pago, el control de costos representa un gran dolor de cabeza -y en gran medida se origina del manejo de fraudes: Los equipos de investigacin dedican mucho tiempo solamente a reunir los datos necesarios para tomar decisiones. Los motores de deteccin siempre estn tratando de ponerse al da con los patrones de fraude ms recientes. Las regulaciones que cambian constantemente incrementan el tiempo y el costo necesarios para lograr el cumplimiento y cubrir los estndares de auditora. Dado su alcance e impacto, reemplazar los sistemas de fraude centrales no es una opcin para la mayora de las empresas. Pero contrario a reemplazarlos, usted puede mejorar el proceso de investigacin con la investigacin aumentada, y mejorar el proceso de deteccin mediante el reforzamiento de los sistemas actuales. Este reporte describe tres formas en que las empresas de servicios financieros pueden utilizar las soluciones de TIBCO para reducir el
Tags : 
    
TIBCO Software
Published By: Lenovo UK     Published Date: Sep 10, 2019
Sabes por dnde corres ms peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solucin completa y totalmente personalizable que protege tu negocio de forma integral. Sabas que se necesitan 23 das de media para recuperarse de un ataque de ransomware1? Averigua por qu la seguridad informtica es lo ms importante, y punto. Descarga nuestra gua de soluciones > 1 IBM: 2017 Global CODB Report Final (en ingls) v
Tags : 
    
Lenovo UK
Published By: Akamai Technologies     Published Date: Sep 04, 2019
Its a bold claim; one that hasnt always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, its that security-related incursions are inevitable. And its news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, theres no longer a choice. As a CIO, CISO, or other security or IT leader, you know its your job to be the central agent stressing the connections between business and digital risk. Its your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thats up from 40% in 2018. Whether your
Tags : 
    
Akamai Technologies
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: KPMG     Published Date: Jun 06, 2019
20 years on from our first global survey of technology leaders, explore the changing role and growing influence of the CIO. Read this report to find out: the top-10 business issues facing customer-centric and digital leaders how successful organisations are turning their strategies into reality which emerging technologies organisations are investing in how IT leaders are aiming to plug the skills gap.
Tags : 
    
KPMG
Published By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr fr einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafr, dass es einfacher wird. Bei so vielen Datenversten, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschrften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu berdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenber ihren Kunden und Aktionren verp?ichtet, Daten zu schtzen und ihre Gefhrdung nicht nur gegenber externen Angreifern, sondern auch gegenber Mitarbeitern zu minimieren. Die im Jahr 2017 am hu?gsten genutzte Methode fr Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenversten im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: ber 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once theyre inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial top of mind topic for Higher Education. For the second time in three years, information security topped Educauses annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
    
ALE
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Cisco Advanced Malware Protection (AMP) offers an integrated, comprehensive approach to endpoint security. Continuous analysis and telemetry features keep its finger on the pulse of network anomalies, and all suspicious activity is investigated. Contextual reporting highlights trends for administers, helping them reassess network architecture to close vulnerable points of entry. Also important is its flexible deployment, which makes it simple for any organization to tailor its endpoint security.
Tags : 
    
Cisco DWA Security
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bots ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's 2017 Critical Capabilities for Security Information and Event Management report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunks advanced security analytics capabilities to meet their SIEM and security intelligence needs improving threat detection, investigation and time to remediation. Its proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartners annual report to make the best-informed buying decision for security and learn about Splunks leadership position in the market.
Tags : 
    
Splunk
Published By: KPMG     Published Date: Jul 18, 2018
The 2018 Harvey Nash/KPMG CIO Survey the largest IT leadership survey in the world shows how CIOs are benefiting from bigger budgets and headcount growth, following years of focus on cutting costs. Read this report to find out: whats driving the growth in IT budgets why CIOS must adapt the way they control technology in the business where CIOs are focusing digital strategies to gain competitive advantage what new technologies organisations are prioritising for investment how smart CIO are managing their resources to get the skills they need. Download the report now:
Tags : 
    
KPMG
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Childrens CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security teams existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
    
Dynatrace
Published By: Workday     Published Date: Mar 02, 2018
Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
: Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
cloud, data, data security, flexibility
    
Workday
Published By: Epicor     Published Date: Feb 23, 2018
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, youre likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in todays manufacturing market. Technology leaders can help drive the companys digital ambition by: Considering whether the business can support full digital transformation or more moderate optimization Observing digital trends across the industry and adjacent industries Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
erp software, enterprise resource planning software, cloud, saas, digital
    
Epicor
Published By: Epicor     Published Date: Nov 14, 2017
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, youre likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in todays manufacturing market. Technology leaders can help drive the companys digital ambition by: Considering whether the business can support full digital transformation or more moderate optimization Observing digital trends across the industry and adjacent industries Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
    
Epicor
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.