scape

Results 251 - 275 of 1064Sort Results By: Published Date | Title | Company Name
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA
Published By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : 
cyveillance, mobile security, cyberattacks, threats, malicious attacks
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Published By: Darktrace     Published Date: Jun 21, 2019
As a prominent US credit union, TruWest was faced with a number of challenges when securing its network and critical digital assets against cyber attackers. With the threat landscape evolving rapidly, and the cost of breaches rising, TruWest security chief, Chris Sprague, discusses how Darktrace gave his team a new way of approaching cyber security.
Tags : 
    
Darktrace
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
The Internet of Things (IoT) has paved the way for a number of innovations that rely on connectivity between devices and the internet. Now, this interconnectivity is impacting the beer brewing process, providing brewers with a consistent, reliable, data-driven experience — and serving customers with a tasty, better brew. This article discusses how the IoT and smart, connected brewing appliances are redefining the industry landscape one beer at a time.
Tags : 
beer, brewing, internet, things, iot, optimization
    
Dassault Systemes SolidWorks Corp.
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The manufacturing landscape faces dramatic change. Creating and capturing value in this new environment requires aerospace companies to not just understand what’s driving these changes, but also grasp just how consequential a role digital transformation will play in determining their future. Download this white paper now to find out how the manufacturing landscape faces dramatic change.
Tags : 
aerospace, aviation, manufacturing, product development, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 28, 2017
This webinar reveals the changes the Aerospace and Defense landscape has experienced recently. Watch this video now to find out how to: • Innovate with Flat Budgets • Master the growing Complexity of Programs • Evolve your Work Force • Achieve record setting production rates View this webinar now to find out more.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Sep 26, 2017
This webinar explains what the Factory of the Future could be like and how to connect all techonologies used. Learn how to create experiences that people can really leverage and become more efficient in the Aerospace and Defense landscape. View this webinar now to find out more.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Dassault Systèmes' has been named by Gartner, Inc. as a “Leader” in its 2017 Magic Quadrant for Manufacturing Execution Systems. 2017 is the first year for the Gartner Magic Quadrant for MES, which specifically covered the MES market, including MOM applications. Because of our position as a Leader in the Gartner Magic Quadrant we believe it confirms the positive response we are receiving on our vision and ability to execute the transformation of manufacturing. We also believe we are being recognized for our unique and holistic approach to MOM / MES and the greater transformative value that digital continuity with DELMIA has across manufacturing engineering, manufacturing operations and the supply chain. DELMIA® Manufacturing Operations Management solutions transform global production operations to achieve and sustain operational excellence. This is accomplished through digital continuity, a shared digital landscape connecting all stakeholders to improve visibility into, control over a
Tags : 
    
Dassault Systèmes
Published By: Data Center Frontier LLC     Published Date: Sep 24, 2019
The hyperscale data center is reshaping the global IT landscape, shifting data from on-premises computer rooms and IT closets to massive centralized data center hubs. Workloads are consolidating in the world’s largest and most efficient facilities. These cloud campuses offer economies of scale, enabling hyperscale operators to rapidly add server capacity and electric power.
Tags : 
    
Data Center Frontier LLC
Published By: Datalink     Published Date: Jun 01, 2012
Assembling an internal private cloud or migrating to an external one is a challenge - both technically and organizationally. Datalink has answers - and a unified solution with the Datalink V-Scape Reference Architecture.
Tags : 
v-scape, vscape, datalink, architecture, infrastructure, migration, storage, networking
    
Datalink
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : 
evolution, big data, technology, datastax, nosql
    
Datastax
Published By: Datastax     Published Date: Apr 04, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
    
Datastax
Published By: Dell     Published Date: Mar 02, 2012
Since the emergence of the personal computer, IT managers have had to navigate through a computing and communications landscape where business and consumer technologies have intersected. Sometimes those intersections produce benefits for all involved; other times they result in destructive collisions.
Tags : 
dell, idg, mobile technology, mobile data, mobile phones, mobile services, network security
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: Dell EMC     Published Date: May 12, 2016
XtremIO gives you unmatched efficiencies for all database workloads. A scale-out database storage platform that consolidates and accelerates everything. Supercharge production, dev/test, and BI/analytics workflows with incredible data reduction and copy data management services. You get incredible and predictable scale-out performance with a low total cost of ownership.
Tags : 
xtremio, all-flash array, agility, application landscapes, data management services, scale-out performance
    
Dell EMC
Published By: Dell EMC     Published Date: May 12, 2016
Businesses face greater uncertainty than ever. Market conditions, customer desires, competitive landscapes, and regulatory constraints change by the minute. So business success is increasingly contingent on predictive intelligence and hyperagile responsiveness to relentlessly evolving demands. This uncertainty has significant implications for the data center — especially as business becomes pervasively digital. IT has to support business agility by being more agile itself. It has to be able to add services, scale capacity up and down as needed, and nimbly remap itself to changes in organizational structure.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 01, 2019
Pursuing agility to truly impact business transformation requires embracing date center modernization as a core competency. Crucial to this is having the most up-to-date IT instructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 17, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape.
Tags : 
    
Dell EMC
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.