Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sif

Results 1 - 25 of 186Sort Results By: Published Date | Title | Company Name
Published By: Sify     Published Date: Sep 12, 2017
The aim of this white paper is to provide you, the reader with a starting point to understand the challenges and opportunities to know when considering your solutions and solutions in India.
Tags : 
data center, india, data, pops, fiber, cabling
    
Sify
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift
Published By: Sift     Published Date: Jul 12, 2019
"You’re fighting fraud, but how well are you doing? Accurate and comprehensive measurement is integral to understanding your business’ health, yet many companies are not tracking fraud and team performance as effectively as they should. READ THIS GUIDE TO FIND OUT: The most important fraud-related KPIs to track How to share key reports across your organization How the right insights can power your competitive advantage "
Tags : 
    
Sift
Published By: Sift     Published Date: Jul 12, 2019
"What trends should you be following for the next 6 months? We’ve pored over the data, sorted through the news, and interviewed experts and (former) fraudsters. Whether you’re planning for the next month, quarter, or year, this ebook can be your guide. READ THIS GUIDE TO FIND OUT: How fraudsters are using technology against us Whether cryptocurrencies are driving fraud or helping to stop it What GDPR tells us about the future of regulation Why content abuse is getting harder to fight How businesses balance user experience with protecting user data "
Tags : 
    
Sift
Published By: Sift     Published Date: Oct 16, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
    
Sift
Published By: Sift     Published Date: Aug 29, 2019
As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach
Tags : 
    
Sift
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
    
Zynapse
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Bancolombia is an award winning, full-service financial institution that provides banking services to customers in 12 different countries and is one of the 10th largest financial groups in Latin-America.With bots from Automation Anywhere, Bancolombia sifts through structured, semi-structured, and unstructured customer data to transform their BPM. Bots automate hundreds of processes and greatly increasing back office efficiency, saving Bancolombia a significant amount of time servicing customers. This has led to an increase in CSAT numbers and has created additional revenue streams.
Tags : 
    
Automation Anywhere APAC
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Published By: Hewlett Packard Enterprise     Published Date: Nov 01, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : 
hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault
Published By: Cisco     Published Date: Feb 23, 2016
As security continues to get more complex Cisco looks at a network visually for secuirty aspects and is not based upon classifications of boundary and segmentation. Putting the 'Network' back in Network Security is an implementation used through: Netflow, Fire & ISE, Beyond Access Control (SGT & TrustSec)
Tags : 
network management, network secuirty, network optimization, networking, security
    
Cisco
Published By: Adobe     Published Date: Mar 21, 2017
L’espace de vente est tellement diversifié que les consommateurs avisés exigent, avec raison, une expérience exceptionnelle et constante.
Tags : 
    
Adobe
Published By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : 
interaction management, business technology, enterprise, forrester, best practices, pegasystems
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: Oct 11, 2018
The consumer durables sector continues to evolve. Consumer demand for connected, energy-efficient appliances is driving investment in R&D – even as profitability pressures necessitate new cost-cutting measures. And intensifying vertical and virtual integration means manufacturers need stronger relationships with extended supply chains. Supply chain and sourcing professionals are leading the charge. Learn how a digital strategy enables the transformation needed to excel today.
Tags : 
    
SAP
Published By: SAP Ariba     Published Date: Oct 11, 2018
The consumer durables sector continues to evolve. Consumer demand for connected, energy-efficient appliances is driving investment in R&D – even as profitability pressures necessitate new cost-cutting measures. And intensifying vertical and virtual integration means manufacturers need stronger relationships with extended supply chains. Supply chain and sourcing professionals are leading the charge. Learn how a digital strategy enables the transformation needed to excel today.
Tags : 
    
SAP Ariba
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Les organismes des secteurs public et privé reconnaissent que la gestiondu cycle de vie des PCdevient plus complexe et coûteuse à mesure queles gammes de PC et les modes de travail des collaborateurssediversifient. Pour optimiser leur productivité, chaque groupe decollaborateurs a des besoins spécifiques en termesde matériel, de logicielet de configuration. Tandis que les services informatiques s’efforcent defournir et de soutenir un plus large éventail de technologies à un personneltoujours plusdispersé et mobile, tout en veillant à limiter les risques deperturbation de l’utilisateur, ils sont également soumis à une intensepression en termes de coûts. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Les organisations publiques et privées reconnaissent que la gestion du cycle de vie des PC devient plus complexe et coûteuse, à mesure que les appareils et les modes de travail des collaborateurs se diversifient. Pour être pleinement productifs, différents groupes de collaborateurs ont des besoins différents en matériel, logiciels et configuration de périphériques. Si les départements IT cherchent à fournir et à prendre en charge un large éventail de technologies pour un personnel de plus en plus dispersé et mobile, tout en assurant une faible interruption de l’activité des utilisateurs, il ne faut pas oublier qu’ils sont soumis à une pression considérable en matière de coûts. À ce titre, consolider les processus et faire appel à un partenaire fournisseur tel que Dell réduit les coûts et donne accès à l’expertise nécessaire pour améliorer les opérations de gestion du cycle de vie des PC. Téléchargez ce livre blanc pour en savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Box     Published Date: Jul 29, 2019
Most CIOs today understand that digital transformation initiatives can help streamline business process; boost ef?ciency; increase competitiveness; and, broadly, help their organization become disruptive over the long term. Some of the transformation initiatives under way—even in many pace-setting companies—are struggling to manage the exponential explosion of unstructured data and the associated heightened compliance and security demands, however. Fortunately, new solutions that tap arti?cial intelligence (AI) can extract hidden insights from unstructured data, such as documents, images, videos, and audio ?les. AI is also helping automate many of the labor-intensive processes used to classify, organize, and analyze unstructured content
Tags : 
    
Box
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.