Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

prevent

Results 476 - 500 of 1028Sort Results By: Published Date | Title | Company Name
Published By: Kronos     Published Date: Jul 26, 2017
Employees and managers face challenges and pressures each day that make work unnecessarily complex and unproductive. This complexity can stand in the way of achieving business goals and prevent employees from delivering the value they want to bring to the workplace. This Coleman Parkes and Workforce Institute at Kronos report highlights key findings and discusses the roles leadership, technology, and talent management play in optimizing workforce engagement for sustained competitive advantage. Learn about the challenges, opportunities, and costs of employee engagement — or lack thereof — in organizations today, and how small changes can go a long way toward engaging employees and ultimately drive business success.
Tags : 
efficiency, employee engagement, leadership, talent management, workforce
    
Kronos
Published By: Anaplan     Published Date: Mar 29, 2018
Incentive compensation represents the potential of delivering optimal sales results. But with up to 60% of sales reps’ income coming from incentive comp, it is crucial to get this right. Our study data has shown that ineffective compensation structures can lead to disengaged reps, high turnover, money left on the table, and low margins. The way we have designed and managed incentive compensation plans in the past may inhibit the sales force and prevent the business from scaling at the needed rate. Modeling and planning quickly become too complex for a spreadsheet-driven exercise.
Tags : 
optimization, compensation, structures, anaplan, data
    
Anaplan
Published By: Infosys     Published Date: May 21, 2018
June 28 is Ukrainian Constitution Day. It is also one of the longer days of the year - and in 2017, for the staff at one multinational corporation, it certainly felt that way. They arrived at work to find computers locked by the Petya ransomware. Would the company grind to a halt? Would they be held to ransom? How could they prevent it from happening again? These were the questions. Infosys was hired to provide the answers.
Tags : 
ransomware, security, computer, corporation, business, enterprise
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
Machines often form the backbone of businesses. Machinery breakdowns are extremely costly and there's never really a good time for these breakdowns. IN response to this challenge, companies have explored a variety of strategies - even preventive maintenance programs - to increase machine uptime. But every strategy - even a combination of strategies - has had only limited success.
Tags : 
strategy, business, machines, maintenance
    
Infosys
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services
Published By: Cohesity     Published Date: Aug 09, 2019
Best practices to prevent, detect, and respond to a ransomware attack targeting your backups
Tags : 
    
Cohesity
Published By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Shell     Published Date: Aug 15, 2018
Shell Lubricants technical experts suggested that the company implement a field trial to compare the fuel economy benefits of Shell Rimula R4 L 15W-40 to Shell Rimula R5 LE 10W-30. Six Volvo trucks running more or less the same duties were selected for the trial, which took place over a period of six months. Three trucks started with Shell Rimula R4 L 15W-40, the other three with Shell Rimula R5 LE 10W-30. After 3 months, this was switched to prevent any possible truck-specific deficiencies. Throughout the trial, fuel consumption was closely monitored by Volvo Fleet management on-board computers.
Tags : 
shell, efficient, fleets, fuel economy, oil drain intervals, maintenance, trucking
    
Shell
Published By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Shell     Published Date: Nov 19, 2018
Your turbine operates in tough conditions—running at high temperatures and exposed to a ton of contaminants. As the pressure to perform builds on your turbine, your turbine oil can start to degrade. Read this brief and learn why monitoring turbine oil condition can be critical to preventing unplanned downtime. You'll also: • Discover the causes of sludge and varnish formation that lead to critical component failure • Understand how common contaminants contribute to degradation processes like hydrolysis • Find out why oil additives become depleted, significantly impacting oil life and performance GET THE BRIEF ON CAUSES AND CURES OF OIL DEGRADATION. In the brief, you’ll learn some of the common causes of turbine oil degradation that happen all the time during the course of turbine operation. Download the brief and learn how to avoid problems like contamination and varnish build-up that can really cost your operation money in unplanned maintenance, repairs, and downtime.
Tags : 
    
Shell
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : 
telecommunications, advanced analytics, telco, customer retention
    
FICO EMEA
Published By: FICO EMEA     Published Date: Aug 30, 2019
Fraud is a serious concern for the communications industry, with proceeds and services used by organised crime and terrorist networks. Whilst reliable statistics are difficult to come by, industry association Communications Fraud Control Association (CFCA) estimates the total global fraud loss at around $29bn annually. Of this, over $7bn is attributed to subscription fraud and account takeover. In an industry which is undergoing widespread digital transformation to streamline customer journeys and reduce operating costs through automation, preventing fraud is critical. Learn More
Tags : 
telecom subscription fraud, prevent fraud, fight fraud
    
FICO EMEA
Published By: FICO EMEA     Published Date: Aug 30, 2019
Telecommunications companies lost more than $29 billion to consumer fraud in 2017 globally (1.27% of their revenues). The largest and most advanced communications service providers (CSPs) have sophisticated fraud detection systems and processes in place, but those organizations are now questioning their fraud readiness. Are they doing enough? Fraudsters may be individuals or increasingly sophisticated criminal networks. They constantly develop new methods and target new lines of business Read this interview where Anat Hoida, Head of the FICO’s Telecom Practice in Europe, Middle East, and Africa, discusses the impacts of the evolving spectrum of fraud risks on the growth and competitiveness of CSPs globally.
Tags : 
telecom subscription fraud, prevent fraud, fight fraud using analytics
    
FICO EMEA
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.