Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

individual

Results 1 - 25 of 434Sort Results By: Published Date | Title | Company Name
Published By: QTS     Published Date: Oct 12, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. The impact of data is being felt beyond the IT department; it is reverberating through every aspect of our lives.
Tags : 
data center, cloud computing, software-defined, it infrastructure, telecom
    
QTS
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Monetate     Published Date: Oct 11, 2018
Monetate Intelligent Recommendations is the only solution that gives merchandisers & digital marketers the power to show contextually relevant product recommendations without burdening IT resources. Using manually curated or algorithmically-driven recommendations, marketers can easily support even the most complex product catalogs. Our solution filters recommendations based on customer attributes (e.g. shirt size), longitudinal behaviours (e.g. browsing behaviour), and situational context (e.g. product inventory at local stores). Best of all, an orchestration layer intelligently selects which algorithms and which filters to apply in any given situation, for any particular individual.
Tags : 
    
Monetate
Published By: Monetate     Published Date: Oct 22, 2018
Monetate Intelligent Recommendations automates recommendations at scale without sacrificing any of the control you require. Our proprietary algorithms know what to serve each individual shopper to maximise brand value, while still allowing the control of an unlimited number of business guardrails defined by you.
Tags : 
monetate, intelligent, recommendations, business, individual, automation
    
Monetate
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Windstream     Published Date: Oct 08, 2018
Vetted Third-Party Service Providers Facilitate The Creation Of Individualized Business Network Fabrics
Tags : 
    
Windstream
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
    
Group M_IBM Q418
Published By: Qualtrics     Published Date: Oct 04, 2018
Advertising is a high-risk game. Done well, ads break through the noise, spark conversations about your brand, drive demand, and boost sales. Done poorly, ads bury your messages, damage your brand image, fail to generate revenue, and waste budget on expensive campaigns that fail to deliver. With so much on the line, getting your ads right is crucial. How do you ensure success? Ad testing. As the name implies, ad testing is validating your ad with your target audience prior to launch. You can test individual portions of your ad, like messaging, headlines, visuals or calls to action, or even initial reactions to early ad concepts. Ad testing gives you the following benefits: • Predict the effect on purchase intent • Make informed go or no-go decisions on a specific ad launch • Understand how your brand is perceived • Get the highest ROI from your ad spend Ad testing is one of the best ways to protect your advertising budget and maximize the chances of landing the right messaging with you
Tags : 
    
Qualtrics
Published By: Adobe     Published Date: Oct 24, 2018
Adobe Audience Manager uses identity management tools and device graphs to tie device IDs to individuals or groups. If a customer starts using a device you don’t recognize, you can use second-party data available through a network or co-op to supplement your own, building a complete view of your customer. This allows you to send consistent messaging across devices, whether your customers log in to your site or not.
Tags : 
    
Adobe
Published By: Monetate     Published Date: Oct 22, 2018
Monetate Intelligent Recommendations automates recommendations at scale without sacrificing any of the control you require. Our proprietary algorithms know what to serve each individual shopper to maximize brand value, while still allowing the control of an unlimited number of business guardrails that you define.
Tags : 
monetate, intelligent, recommendations, business, individual, automation
    
Monetate
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: SAP     Published Date: Mar 02, 2017
Deploying a performance management system is a powerful catalyst for increasing employee and organizational performance. If not handled properly, however, organizations risk creating unnecessary administrative work which can diminish some of the benefits. A key challenge is to balance the tension between creating a fair and consistent evaluation process across the organization and measuring employee performance based on individual needs. What best practices should you follow to help strike the right balance? How have other leading organizations designed effective review forms and processes?
Tags : 
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Zoom     Published Date: May 15, 2015
This is a case study about a proactive approach to protect mobile devices and networks for individuals, businesses and governments.
Tags : 
    
Zoom
Published By: Cisco     Published Date: Feb 12, 2016
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
ebooks, cisco, productivity, digigal, collaboration tools
    
Cisco
Published By: Cherwell Software     Published Date: Apr 07, 2016
Highlights for Children, Inc. was founded in 1946 with the belief “that children are the world’s most important people.” Since its inception, the organization has been dedicated to helping children “become their best selves and become confident, caring, curious, and creative individuals.” Today, the Highlights for Children, Inc., family of companies includes educational publishers who publish textbooks and offer educational seminars for teachers, as well as a consumer division that publishes books, digital products, and four magazines for children ages 0-12. The flagship magazine is Highlights for Children, well known for its Fun with a Purpose.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.