ber

Results 1 - 25 of 4176Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
     MessageLabs Australia
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
     Aberdeen
By: Kindred Hospital Rehabilitation Services     Published Date: Jul 10, 2019
Rehab programs will experience a major infux of medically complex patients, including those with neurological conditions, in the coming decades. The drastic increase is being spurred by an aging population. For instance, stroke prevalence is expected to rise by 21% by 2030, and more than 1.2 million citizens are projected to have Parkinsons disease. This leaves rehab leaders with one signifcant question: What can be done to prepare for the increase of medically complex patients? By evolving to meet the needs of this changing population, rehab programs can successfully meet the challenge, providing patients with the highest level of care while achieving greater performance standards. In this whitepaper, well examine the three areas that drive the greatest impact on treating medically complex patients: Clinical staff Tech innovation Patient and family member experience
Tags : 
     Kindred Hospital Rehabilitation Services
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way todays modern business operates. Theyve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware. While malwares pervasiveness may not come as a surprise to many people, whats not always so well understood is that automating app attacksby means of malicious bots is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
     F5 Networks Singapore Pte Ltd
By: KPMG     Published Date: Oct 15, 2019
Were seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. Responsible or sustainable finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
     KPMG
By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
     KPMG
By: KPMG     Published Date: Oct 15, 2019
Welcome to KPMGs third annual report tracking developments in Chinas pension industry. This is a topic of great economic significance. As the worlds most populous country, China has an ageing society and is developing the infrastructure to take care of a growing number of elderly people. The topic also has business significance, especially for financial companies able to find opportunities in the fast-growing pension sector. This report updates and builds on our findings from last year. That report identified sector convergence as one of the most distinct features of the Chinese pension industry, as well as highlighted several strategic themes that will influence its long-term development. In the pages that follow, we explain the most recent developments and their strategic implications.
Tags : 
     KPMG
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. Its become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todays assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion recordsa large majority of which included usernames and passwords.1 This wasnt new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials arent stolen just for funthey are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are botsmalicious onesbecause they enable cybercriminals to achieve scale. Thats why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
     F5 Networks Singapore Pte Ltd
By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Anwendungsperformance und Bereitstellung haben sich gendert. Sollten Sie Ihr Netzwerk anpassen? Mit der Cloud ndert sich grundstzlich die Art, wie IT-Teams Anwendungen bereitstellen und deren Performance managen. Anwendungen werden immer hufiger an Standorten fernab der Nutzer installiert. Bei der bertragung werden hufig Netzwerke durchquert, die nicht direkt von der IT kontrolliert werden knnen. Statt in Unternehmensrechenzentren befinden sich viele Anwendungen nun in Public und Hybrid Clouds. Es gibt sogar eine ganz neue Art von Anwendungen: solche, die auf Microservices und Containern basieren.
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Mithilfe der Kombination aus Citrix Networking und Google Cloud kann die IT verschiedene Herausforderungen in den Bereichen Anwendungsbereitstellung und -management meistern.
Tags : 
     Cisco and NVIDIA Corporation
By: SES     Published Date: Aug 01, 2019
Descubra cmo una empresa de comunicaciones est llevando conectividad a las zonas ms remotas de Per. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avin, Axesat est entregando soluciones por satlite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cmo, en asociacin con SES Networks, la empresa puede aumentar el comercio y la conectividad en Per.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicaes est levando conectividade s reas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessvel apenas por avio, a Axesat est levando solues de satlite e cobertura de rede 4G a reas que eram impossveis de alcanar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comrcio e a conectividade no Peru
Tags : 
     SES
By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
     Juniper Networks
By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This years research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: how growing cloud dependency has created distinctive challenges around cyber security what the biggest cyber challenges are for organisations in this context how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security a set of cybersecurity considerations for modern IT environments.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: how consumer expectations are shifting on the topic of digital trust how well the priorities of consumers and security executives align what it takes for consumers to stay with a brand when things go wrong.
Tags : 
     KPMG
By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartners 2017 prediction that through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS dont experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
     CloudHealth by VMware
By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 yearsbut the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates dont undermine the very user experience that were working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
     Tricentis
By: PwC     Published Date: Sep 18, 2019
The traditional payer business model is fast becoming obsolete. Blues organizations that cling to the status quo or business as usual risk jeopardizing their reputations and business, because people are more than patients. Increasingly, employers are driving the growing demand for more solutions to engage customers. In response, healthcare incumbents and new entrants are building solutions to address rising costs and meet consumers demands for personalization, price transparency, access, and seamless, simple experiences. Proactive engagement can help your members lead healthier lives while improving outcomes for payers and other players. With 5% of Americans consuming 50% of healthcare costs, identifying and engaging high-risk, high-cost customer segments is essential to sustainability.
Tags : 
     PwC
By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload. By integrating the IBM Resilient SOAR Platform with IBM QRadar Security Intelligence, security teams can build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases.
Tags : 
     Group M_IBM Q4'19
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr fr einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafr, dass es einfacher wird. Bei so vielen Datenversten, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschrften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu berdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenber ihren Kunden und Aktionren verp?ichtet, Daten zu schtzen und ihre Gefhrdung nicht nur gegenber externen Angreifern, sondern auch gegenber Mitarbeitern zu minimieren. Die im Jahr 2017 am hu?gsten genutzte Methode fr Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenversten im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: ber 80% der erfolgreichen Cyber-An
Tags : 
     Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.