trend

Results 2101 - 2125 of 2151Sort Results By: Published Date | Title | Company Name
By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : palo alto, automated malware, security, cloud, forrester report
     Palo Alto Networks
By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : veracode, security, devops, application security, enterprise applications
     Veracode
By: 8x8 Inc.     Published Date: Feb 13, 2017
In our increasingly global economy, it’s no surprise that more and more businesses are going global with their contact centers. This trend is driven by many factors including international acquisitions and the availability of highly skilled, lower cost talent in many parts of the world. This eBook Taking Your Contact Center Global explains the top challenges businesses must surmount when expanding internationally and what they need to know to be successful. Download this complimentary eBook and learn: 4 challenges every global contact center will face Why cloud-based contact centers have the advantage Why not all cloud contact centers are perfect, and 3 things to watch out for How to get the upper hand when it comes to call quality, local numbers, and creating a unified, global contact center
Tags : contact center, global growth, cloud-based contact, call quality
     8x8 Inc.
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : access management, integrated platform, cloud security, enterprise security, data security
     IBM
By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : cyber security, lookout, smartphone, tablet, mobile
     Lookout
By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : cloud, solutions, ecm, onbase, hyland, data, availability, encryption
     OnBase by Hyland
By: Zebra Technologies     Published Date: May 02, 2018
Consumers equipped with smartphones expect fast, convenient and uniquely relevant shopping experiences in store and online. As a result, one-third of shoppers are not satisfied with the in-store experience, turned off by everything from chronic out-of-stocks to cookie-cutter products and marketing messages that speak to the masses, as opposed to them as individuals. In turn, retailers are empowering front-line associates with tools designed to add newfound conveniences, such as locating inventory without having to leave a shopper’s side, to texting them curated product offers based on in-store and online buying patterns and preferences These are just a few of the insights found in Zebra’s 10th annual shopper study, which surveyed nearly 7,500 consumers from North America, Latin America, Asia-Pacific, Europe and the Middle East to gain a deeper understanding of shopper satisfaction and retail technology trends that are reshaping brick-and-mortar and online stores.
Tags : retail, mandate, shopper, vision, zebra, consumers
     Zebra Technologies
By: Juniper Networks     Published Date: Jun 22, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis. To celebrate this trend, we will showcase in this article a selection of the latest and greatest innovations offered by Asia’s leading BSFI organisations, which we believe represent the future of BFSI services not just in the region, but worldwide.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
     Juniper Networks
By: Pure Storage     Published Date: Jul 03, 2019
Tapping into the power of big data can be daunting. So we’ve looked at the strategic areas your organization can focus on. Our overview of emerging trends revealed three challenges of big data, and opportunities therein:
Tags : 
     Pure Storage
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
     Q2 eBanking
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the how a one- size fits all approach does not always work.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the essentials of Container Monitoring so download right away to find out more.
Tags : 
     CA Technologies EMEA
By: Quick Base     Published Date: Aug 07, 2017
Many financial leaders struggle to find enough time to do everything needed because they must deal with manual processes and clunky spreadsheets. If you're concerned about wasting time by manually collecting financial data, find out how to conquer spreadsheets with the power of automation. You'll learn key trends and insights backed by research and hear real-world examples and best practices for financial automation. You'll come away with the practical tips and inspiration you need to improve team performance, mitigate financial risk, and increase business impact.
Tags : 
     Quick Base
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     BlackBerry Cylance
By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
     OKTA
By: CyberSource     Published Date: Sep 26, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
     CyberSource
By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
     Reputation.com
By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: ChannelAdvisor     Published Date: Jan 17, 2019
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more.
Tags : 
     ChannelAdvisor
By: Infosys     Published Date: Feb 07, 2019
Examining trends identified by 5,000 shoppers that provide guideposts for setting a strategic course for growth.
Tags : 
     Infosys
By: Ephesoft     Published Date: Jun 01, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
     Ephesoft
Start   Previous    73 74 75 76 77 78 79 80 81 82 83 84 85 86 87    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.