mine

Results 1551 - 1575 of 1587Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Mar 28, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share.
Tags : 
enterprise, mobile, ios, android, lookout
    
Lookout
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 26, 2018
In our 37-criteria evaluation of enterprise health cloud providers, we identified the 10 most significant ones — ClearDATA, CloudMine, IBM, Kinvey, Medable, Microsoft, MphRx, NTT DATA, Salesforce, and SAS — and researched, analyzed, and scored them. This report shows how each provider measures up and helps healthcare CIOs make the right choice.
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Companies that manufacture industrial equipment find themselves in a unique place among manufacturers: • Their products can range from small components to mammoth machines for mines or mills. • They rarely order large production runs and may be called on to create a process that results in an order of one. • Their markets impose challenging constraints. Customers want more choices, more options, more extras, and more features. And they want the order to be fulfilled sooner. The competitive environment is forcing model cycles to shrink, pressuring manufacturers to accelerate processes that are unable to keep pace. Dassault Systèmes DELMIA has assembled an industry-specific set of roles for industrial equipment manufacturers that brings these challenges under control.
Tags : 
    
Dassault Systèmes
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
    
Q2 eBanking
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: CyberSource     Published Date: Sep 26, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
    
CyberSource
Published By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
    
Reputation.com
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Enterprises often treat information security technology as an insurance policy against the potentially devastating costs of not deploying it. From that perspective, your security technology’s ROI is determined by the time it takes for a breach—one with costs equal to or greater than your investment—to occur. Your ROI could be immediate. Or it could be longer term. With that in mind, it is hard to justify yet another security technology, but a move to the cloud suggests that you should.
Tags : 
    
Oracle Security Solutions
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for manufacturing operations that assists customers with the entire process: from financial management to supply chain management and production management. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectivelyexamine the potential return on investment (ROI) enterprises may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their manufacturing organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with four Enterprise Management manufacturing customers, each with at least three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Cisco EMEA     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA
Published By: MineralTree     Published Date: Jan 23, 2018
Automated invoice capture, approval workflows and data storage together with search and reporting features save Moda Operandi staff hours that are ordinarily wasted, especially during an audit.
Tags : 
    
MineralTree
Published By: MineralTree     Published Date: Jan 23, 2018
With automation technology, they are on track to save 60% of their finance department time to achieve their goal to focus on more critical areas of finance.
Tags : 
    
MineralTree
Published By: Service Now     Published Date: Jan 26, 2018
ServiceNow commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying ServiceNow Customer Service Management throughout their customer support organization. This study provides a framework for evaluating the potential financial impact of investing in ServiceNow. Download this whitepaper to learn more about how Epicor has transformed with ServiceNow Customer Service Management.
Tags : 
    
Service Now
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Workday France     Published Date: Feb 04, 2019
L'étude « Tendances RH 2018 » de Deloitte met en évidence de nombreuses tendances liées au resssenti des salariés et des employeurs. Découvrez les points clés de cette étude et les 3 étapes que les entreprises émergentes doivent suivre pour attirer et fidéliser les meilleurs talents.
Tags : 
    
Workday France
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee