web

Results 251 - 275 of 4072Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
     Group M_IBM Q418
By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
     Cohesity
By: Cohesity     Published Date: Oct 02, 2018
Public cloud expansion will continue to see double digit growth over the next five years according to IDC. Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however weren’t architected with the cloud in mind. They require use of cloud gateways and don’t scale well in the cloud. Cohesity integrates with Amazon Web Services, Microsoft Azure, and Google Cloud Platform to extend your on-premises data protection solution to these public cloud services. Our built-in cloud capabilities give you flexibility to use the cloud for multiple use cases. Download the solution brief for more details.
Tags : solution, brief, enterprise, grade, capabilities, public, cloud, data
     Cohesity
By: Qualtrics     Published Date: Oct 02, 2018
Customer journey mapping is a major component of any customer experience program. Of course, a key part of mapping the customer experience includes identifying key moments of truth or moments of consumer brand interaction that shape brand perception and loyalty. In the digital age, many key moments of truth for your customers are happening online. This means that more and more of your consumers, brand perceptions and attitudes will be based on purely digital interactions (in-app, website, wearable tech, etc.). This has made understanding your customers’ digital interactions an essential part of any customer experience program. “It has been said that VOC programs without a web presence engage only 2% to 10% of those who interact with their website” (marketing sherpa). As we move into the future, this trend will continue. We know that mobile is an inherent part of today’s digital experience. Global mobile and tablet internet usage just exceeded desktop use for the first time (GS StatCoun
Tags : 
     Qualtrics
By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
     PGi
By: PGi     Published Date: Oct 01, 2018
Today, businesses and teams are becoming more dispersed, and the speed of doing business is accelerating. These two realities point to the growing need for reliable tools that allow teams to successfully work, collaborate and engage customers and team members in a meaningful way. Webinars and web conferences can empower your people to do just that.
Tags : 
     PGi
By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
     PGi
By: PGi     Published Date: Oct 01, 2018
Heutzutage werden Unternehmen und Teams immer mehr verstreut unddie Geschwindigkeit der Geschäftstätigkeit nimmt zu. Diese beiden Realitäten verdeutlichen den wachsenden Bedarf an zuverlässigen Tools, die es Teams ermöglichen, erfolgreich zu arbeiten, zusammenzuarbeiten und Kunden und Teammitglieder sinnvoll zu binden. Webinare und Webkonferenzen können Ihre Mitarbeiter befähigen, genau das zu tun.
Tags : 
     PGi
By: PGi     Published Date: Oct 01, 2018
Actuellement, les entreprises et les équipes se dispersent de plus en plus et la vitesse pour mener des affaires s’accélère. Ces deux réalités mettent en relief le besoin croissant d’outils fiables permettant aux équipes de travailler, collaborer et engager les clients et les membres de l’équipe avec succès et d’une manière judicieuse. Les webminaires et les conférences web peuvent donner à votre personnel les capacités pour y parvenir.
Tags : 
     PGi
By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : continuous delivery, application delivery, testing, test data management
     CA Technologies EMEA
By: Civica Digital     Published Date: Sep 28, 2018
If there’s one thing that stands out about central government, it’s the appetite for digital transformation. Whether delivering new customer-facing websites to drive better engagement with services or establishing a centre of excellence to accelerate the take-up of robotic process automation (RPA), UK government is embracing opportunities to modernise with new technologies. But despite the great strides made in the last few years, the UK is slipping backwards in E-Government development terms – down from #1 in 2016 to #4 in 2018, according to the UN E-Government Survey 2018. Some argue this is due to the government having tackled the more straightforward digitisation opportunities and because it is now facing the bigger, more complex systems that need modernising. Our research shows that there are also wider challenges, including uncertainty around the impact of Brexit, budgetary pressures and emerging technologies, coming into play. So what needs to happen to overcome our challenges
Tags : 
     Civica Digital
By: Applause Israel     Published Date: Sep 25, 2018
In the midst of an overwhelming amount of disruption taking place in the retail banking industry, a clear path to success has emerged. Banks that want to continue to gain and retain loyal customers must make it easier to bank with them. According to a survey that included 760 different banks and credit unions, the most important priority for 2017 and beyond is the removal of friction from the customer journey.1 To clarify, today’s customer journey includes both the customer experience at local branch locations as well as their experience while interacting with websites, mobile apps, smart watches, and anything else that is connected to the Internet. The battleground for customers has shifted to the digital world, and retail banks must adapt quickly as crafty Fintech startups and tech giants like Amazon, Apple, and Google continue to push the limits of what is possible with technology. If digital channels aren’t approached correctly, they can add complexity to the customer experience in
Tags : 
     Applause Israel
By: Applause Israel     Published Date: Sep 25, 2018
The goal of usability testing, simply put, is to make sure that a user can complete the tasks they are expected to complete. Usability testing doesn’t test whether or not the functions of the application, website or connected device work correctly, but rather that a user intuitively understands how to perform these tasks — and how easy or difficult it was to do so. With usability testing, “close enough” won’t cut it. A product may have a superior architecture, a great set of features, good performance, scalability and a number of other positive attributes. However, all of this effort is wasted if the user experience is inadequate. An application, website or connected device that is not user-friendly is just as bad as a buggy version and can lead to diminished revenue, product abandonment or a total failure. An application with poor usability can also negatively affect a brand
Tags : 
     Applause Israel
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.