sca

Results 1 - 25 of 4110Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Oct 23, 2019
Marketers are using more location data than ever, but consumer privacy concerns and an evolving regulatory landscape have raised new challenges. There is a need for more consideration and transparency about around collecting and using geolocation data. Watch this webinar to learn about: • The various ways marketers are using location data today • How consumers feel about location sharing • How new government regulations may impact data collection Besides the two eMarketer Analysts, Hervé Utheza, Head of Media, Advertising & Telco at HERE Technologies joins the conversation and gives valuable insight on how to improve campaign performance through real world geometry. View the webinar now on demand.
Tags : 
     HERE Technologies
By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
     MediaPass
By: VMware     Published Date: Sep 12, 2019
As the nature of work continues to evolve, modern organizations face an ever-changing set of challenges. The consumerization of IT and an increasingly mobile workforce have created a generation of workers who interact with data and information in entirely new ways. If businesses want to keep their footing in this new landscape, they must respond in ways that allow them to stay both flexible and secure.
Tags : 
     VMware
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
     Experian
By: KPMG     Published Date: Oct 15, 2019
Welcome to KPMG’s third annual report tracking developments in China’s pension industry. This is a topic of great economic significance. As the world’s most populous country, China has an ageing society and is developing the infrastructure to take care of a growing number of elderly people. The topic also has business significance, especially for financial companies able to find opportunities in the fast-growing pension sector. This report updates and builds on our findings from last year. That report identified sector convergence as one of the most distinct features of the Chinese pension industry, as well as highlighted several strategic themes that will influence its long-term development. In the pages that follow, we explain the most recent developments and their strategic implications.
Tags : 
     KPMG
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: Schneider Electric     Published Date: Oct 17, 2019
Powered by Smart machines, the new industrial revolution is changing how machine builders design and manufactures operate today and in the future. To remain competitive and profitable, plants and machines will have to be smarter- better connected, more efficient, more flexible and safe. This paper explains the impact of smart machines on the industrial automation and controls businesses and provides guidance for adapting to a changing industrial landscape.
Tags : iiot, industry 4.0, control panel, industrial automation, smart manufacturing, smart machines, smart maintenance
     Schneider Electric
By: Pure Storage     Published Date: Sep 13, 2019
Discover how to revolutionize processing performance, data intelligence, customer experiences, and GRC. The future of financial services will belong to those who can capture and capitalize on data. And it all begins with employing modern data strategies in four critical areas. Description You’ll learn how to: Leverage AI, machine learning and predictive analytics. Get scalable, high-speed access to vast amounts of data. Respond faster, become more competitive, and attract new customers.
Tags : 
     Pure Storage
By: SES     Published Date: Aug 01, 2019
Descubra cómo una empresa de comunicaciones está llevando conectividad a las zonas más remotas de Perú. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avión, Axesat está entregando soluciones por satélite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cómo, en asociación con SES Networks, la empresa puede aumentar el comercio y la conectividad en Perú.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicações está levando conectividade às áreas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessível apenas por avião, a Axesat está levando soluções de satélite e cobertura de rede 4G a áreas que eram impossíveis de alcançar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comércio e a conectividade no Peru
Tags : 
     SES
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: Hitachi EMEA     Published Date: Sep 24, 2019
To stay competitive and satisfy your customers in today’s digital economy, you need faster, scalable and more efficient IT performance. Adopting all-flash solutions can meet these performance demands. Now is the time to consider Hitachi as your long-term strategic partner for fast-evolving all-flash technology.
Tags : 
     Hitachi EMEA
By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs provide supply chain stacks and applications with: Greater agility Contextual intelligence Real-time data implementation Speed Scale Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : here technologies, supply chain, mapping
     HERE Technologies
By: HERE Technologies     Published Date: Sep 23, 2019
As ride-hailing, e-commerce and food delivery services continue to grow, the value of curbside space is increasingly apparent. Though valuable and potentially lucrative, its original design is failing to live up to the needs of today's society. The demand for curbside space is growing, but the asset itself is fixed. To reduce urban congestion, ensure optimal roadway performance management, encourage new mobility solutions and facilitate on-demand delivery efficiency, it is vital that the curb be better utilized. In this eBook, gain insight from six visionaries and thought leaders with a stake in the landscape of urban mobility as they share how to better optimize curbside space.
Tags : 
     HERE Technologies
By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
     KPMG
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We ruled out Zscaler due to its overly complex architecture and PAC file requirements. The ongoing management would have been a nightmare.” - Marc Tournier, Information Security and Compliance Manager (CISO), Avril Group
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
     Cisco Umbrella EMEA
By: BillingPlatform     Published Date: Jul 30, 2019
In order to give their commercial customers the best prices and most flexible purchasing options possible, Floor & Decor offers lines of credit through their preferred credit provider, CIT. To fully leverage and scale this partnership, Floor & Decor needed a way to quickly check credit availability in their retail stores on demand. It also needed to generate invoices to send to their commercial customers while providing assignment notices to CIT.
Tags : 
     BillingPlatform
By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology
Tags : 
     Amazon Web Services EMEA
By: Workday APAC     Published Date: Oct 07, 2019
"Following a study of hundreds of organisations about how they scale agile, this Harvard Business Review article outlines what they’ve learned, and how to scale agile effectively. They studied small firms that run their entire business with agile methods, already agile larger companies that are becoming even more agile as they’ve grown, and organisations that are making the transition from traditional hierarchies to more agile enterprises. Download the article to discover how these organisations have scaled agile effectively. "
Tags : 
     Workday APAC
By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Agile Integration Methodology: Container-Based and Microservices-Aligned Lightweight Integration Runtimes - This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
     Group M_IBM Q4'19
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com