Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

phi

Results 1 - 25 of 2006Sort Results By: Published Date | Title | Company Name
Published By: Infield Clipboard     Published Date: Oct 05, 2017
The IoT is more than just machines talking to each other. Consumers rely on it to make their lives more convenient. Industry leaders use the Internet of Things to sell products, automate workflows, and engage with consumers. As time goes on and the technology develops, you’ll see that the IoT is the reason for the Fourth Industrial Revolution (Industry 4.0)
Tags : 
fortune 100 companies, iot, innovation, industry 4.0, infield clipboard
    
Infield Clipboard
Published By: Citrix     Published Date: Jul 14, 2016
Download the FREE infographic, showing the key benefits of Netscaler: 1. Significant Cost Savings 2. Hours saved 3. Boost ROI
Tags : 
data center, cost savings, citrix_uk/eu, networking, security, it management, telecom
    
Citrix
Published By: Commscope NL     Published Date: Apr 19, 2018
A Commscope infographic for data center builders and developers.
Tags : 
edge, cloud, data center build, commscope_nl_6_steps, checklist
    
Commscope NL
Published By: Juniper Networks     Published Date: Mar 15, 2017
What is the business value of Juniper Networks' solutions?
Tags : 
data center, infrastructure, networks, bandwidth, fiber, ip networking, juniper_dcd, networking
    
Juniper Networks
Published By: Juniper supplement     Published Date: Sep 22, 2015
Web services An examination of those organizations using web services successfully and find that they have chosen their networking infrastructure carefully and taken advice about future upgrade strategies. SDN and NFV We look at whether software defined networking (SDN) or network functions virtualization (NFV) will solve the problem of the sheer volume of new applications, and when they are likely to fulfil their promise. 9 Infographic Inside information from Juniper Networks on how to avoid that cyberattack and if you can’t – how to neutralize it. 10 Internet of Things How will you deal with the 1.6 zettabytes of data the Internet of Things is preparing to throw your way? Get your smart spectacles out and read how! 14 Colocation We take a look at why the rapid growth in cloud Services could very well be a big help for co-location – a sector which is still growing very nicely thank you.
Tags : 
data center design and management
    
Juniper supplement
Published By: Nlyte     Published Date: Nov 17, 2017
Nlyte Energy Optimizer, a comprehensive solution, replaces outdated software to allow Mentor Graphics to easily and quickly monitor infrastructure in 18 countries.
Tags : 
    
Nlyte
Published By: Commscope     Published Date: Apr 18, 2018
A Commscope infographic for data center builders and developers.
Tags : 
edge, cloud, data center build, commscope dach, checklist
    
Commscope
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Published By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS
Published By: RMS     Published Date: Jul 25, 2019
U.S. Flood is a high-gradient, intricate peril incorporating various sources, and causing a variety of effects. It requires sophisticated models, data science, and analytics technology to properly understand and assess each risk.
Tags : 
    
RMS
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: Jeppesen     Published Date: Oct 01, 2019
Airlines are putting a serious dent in their operating budgets by using technology solutions to save on crew costs—up to 15% each year. Download this infographic to learn more.
Tags : 
    
Jeppesen
Published By: Jeppesen     Published Date: Oct 08, 2019
Get this infographic to go behind the scenes and explore the four phases of transforming raw aeronautical information into NavData. From Ingest to Completed Chart, the process ensures fidelity to the highest standard of quality and accuracy, resulting in four times few alerts issued than the next leading solution.
Tags : 
    
Jeppesen
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, you’ll be protecting your network against today’s threats and beyond. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Cisco has been named in the first ever Gartner ‘Voice of the Customer’ report for the Secure Web Gateways (SWG) market for Cisco Umbrella. Gartner Peer Insights is a peer review and ratings platform designed for enterprise software and services decision makers. This document synthesizes Gartner Peer Insights’ content in the SWG market for 2018. Gartner states that ""this peer perspective along with the individual detailed reviews, is complementary to expert research and should play a key role in the customer buying process."" This report includes: - SWG Peer Reviews and Ratings - Vendor comparisons - Reviewer demographic"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Jeppesen     Published Date: Oct 01, 2019
"Empower your employees to streamline the process, decrease the risk and improve the cost of flight. Get this infographic to learn how different types of airline personnel use Jeppesen Aviator to boost the efficiency of flight operations."
Tags : 
    
Jeppesen
Published By: Jeppesen     Published Date: Oct 08, 2019
Airlines are putting a serious dent in their operating budgets by using technology solutions to save on fuel costs—up to 4% each year. Download this infographic to learn more.
Tags : 
    
Jeppesen
Published By: Excellus BlueCross BlueShield     Published Date: Sep 20, 2019
Oral health can have a big impact on your bottom line. Learn how to take care of your employees and your company. Each year, 164 million hours of work are lost in the U.S. to dental disease.1 So it’s clear that helping employees with their oral health can have a big impact on your team’s productivity. Combining your medical and dental benefits with Excellus BlueCross BlueShield can help catch small problems early to keep costs in check – and it’s more affordable than you might think. Find out more by downloading a free infographic from Excellus BlueCross Blue Shield, and get more resources covering a range of health-related topics at ExcellusforBusiness.com.
Tags : 
    
Excellus BlueCross BlueShield
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.