assurance

Results 1 - 25 of 199Sort Results By: Published Date | Title | Company Name
Published By: Riskified     Published Date: Aug 06, 2019
By partnering with an end-to-end solution, merchants can increase approval rates and eliminate costly chargebacks and manual reviews. Those have been Riskified’s traditional benefits since we first struck out to change the eCommerce world in 2013. But in 2019, that’s simply not enough anymore. As eCommerce merchants continue to innovate, the expectations of American consumers have also risen. They expect a multitude of fulfillment options, and they demand that merchants provide them securely. For a business to stand out, offering an excellent product or service is not enough — it’s also about limiting confusion, limiting friction, providing reassurance, and creating the smoothest possible purchase journey every single time. It’s hard to do that alone. That’s what we’re here for.
Tags : 
    
Riskified
Published By: TIBCO Software     Published Date: Jul 22, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: TIBCO Software     Published Date: Feb 01, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
data, product, manufacturers, manufacturing, processes, technologies, analysis, quality
    
TIBCO Software
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software GmbH
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: Infosys     Published Date: May 21, 2018
Our client is a very well-known, long-established bank with over 13 million customers across the globe. Over the years, they had built up a large and complex technological legacy. The landscape included over 1,000 different applications residing on a complex architecture and a hybrid mix of technology, which made testing the non-production environment an increasingly difficult task for quality assurance (QA) teams. Testing environments were fragmented, and this was compounded by a lack of ownership, governance processes, and communication regarding the status of environment readiness; causing delays, extending time to market, and increasing cost.
Tags : 
banking, technology, environment, governance, communication
    
Infosys
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Alight Solutions     Published Date: May 07, 2018
Choosing a payroll provider is never easy. Read the top questions you should be asking to assess payroll providers.
Tags : 
payroll provider, tax vendor, garnishments, quality assurance, tax reconciliation, payroll on cloud, payroll service, tax filing
    
Alight Solutions
Published By: Amazon Web Services     Published Date: Apr 28, 2018
Les technologies d'intelligence artificielle telles que l'apprentissage machine et le Deep Learning permettent d'obtenir des informations et de la précision à deux marques majeures dans des secteurs très différents : la santé et les assurances. Des théories sur les futures incidences de l'intelligence artificielle (IA) sur les entreprises et la société vont florissantes. Mais la réalité du terrain aujourd'hui pour les entreprises et les dirigeants appliquant des technologies comme l'apprentissage machine et l'apprentissage profond à leurs enjeux majeurs est déjà très enthousiasmante. Les modèles de fonctionnement sont refondés en se basant sur les informations obtenues de puissantes capacités cognitives. De nouveaux produits et services améliorent l'expérience client, voire la condition humaine. D'une façon très concrète et significative, l'IA change le monde pour le meilleur.
Tags : 
    
Amazon Web Services
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Bluewater Learning     Published Date: Apr 09, 2018
As great as Cornerstone OnDemand is, anyone could use a little help solving more of their learning and talent management challenges. With the right partner, you can achieve greater business results with Cornerstone almost immediately.
Tags : 
bluewater, bluewater assurance, cornerstone ondemand support, cornerstone ondemand administration, cornerstone ondemand assurance, cornerstone ondemand reporting, cornerstone ondemand ux workflows, cornerstone ondemand content
    
Bluewater Learning
Published By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
Published By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : 
business, cloud solutions, data centre, smb, systems, technical
    
Cloud Direct
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee