att

Results 1 - 25 of 4070Sort Results By: Published Date | Title | Company Name
By: Darktrace     Published Date: Jun 17, 2019
This leading Canadian local distribution company was concerned about fast-moving and automated threats like ransomware that have the potential to compromise its network within minutes. By arming itself with Darktrace’s innovative self-learning technology, Energy+ has renewed confidence in its security stack’s ability to mitigate evolving and increasingly automated attacks.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
The self-learning capability of Darktrace’s Enterprise Immune System allows TruWest to stay ahead of today’s sophisticated attackers, affording the credit union and its clients confidence in the integrity of their data and in the security of their assets. And with Darktrace’s coverage of Office 365, TruWest’s entire digital environment is protected by world-leading cyber AI.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
As a prominent US credit union, TruWest was faced with a number of challenges when securing its network and critical digital assets against cyber attackers. With the threat landscape evolving rapidly, and the cost of breaches rising, TruWest security chief, Chris Sprague, discusses how Darktrace gave his team a new way of approaching cyber security.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
H&M manages nearly two million containers every year and provides a range of services — including steamship lines, intermodal trucking, and warehousing — to facilitate effective supply chain management. The company’s attack surface was rapidly expanding as its scope of operations widened, and, having positioned itself as an early champion of increased integration in the industry, it placed paramount importance on adopting a proactive approach to cyber security.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
By: ExpertVoice     Published Date: Jun 17, 2019
I’m not sure if you’ve heard, but people keep talking about how we’re in the midst of a retail apocalypse. It’s this thing where lots of brick-and-mortar locations close down, and even entire companies go out of business. There’s quite a bit of blame to go around: The Great Recession, and Amazon, and private equity, and shifting consumer spending behaviors. In spite of the doomsday headlines, some brands continue to succeed, and a lot of those brands seem to be focusing on one thing: the customer experience. A good retail experience for a customer can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, according to this recent panel surveying retail employees, only 35% of retail employees feel as though training is effective. That’s a scary number for both retailers and brands, because without a well train
Tags : 
     ExpertVoice
By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
     AppZen
By: HERE Technologies     Published Date: Jun 14, 2019
Rising urbanization and upward of a billion vehicles in operation across the world have brought unprecedented levels of traffic and congestion to our major towns and cities. On the front-line are the emergency dispatchers and responders. Every day, they face complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : mapping, public saftey, location data
     HERE Technologies
By: Beqom     Published Date: Jun 12, 2019
HR and sales leaders are challenged to streamline the compensation process while attracting and retaining top talent, supporting business strategy, and maintaining regulatory compliance. Download the report to learn inside secrets to getting your total rewards digital transformation right.
Tags : 
     Beqom
By: Beqom     Published Date: Jun 12, 2019
Les responsables RH et commerciaux doivent rationaliser le processus de rémunération tout en attirant et en gardant les meilleurs éléments, en soutenant la stratégie commerciale et en assurant la conformité réglementaire. Téléchargez le rapport pour apprendre des secrets permettant d'obtenir la transformation numérique de votre récompense totale.
Tags : 
     Beqom
By: AWS     Published Date: Jun 11, 2019
Trupanion, a Seattle-based medical insurance provider for cats and dogs, needed to find data insights quickly. With only 1% of pet owners insured, the process of evaluating a claim to approve or deny payment was manual and time-consuming. Building accurate predictive models for decision-making required manpower, time, and technology that the small company simply did not have. DataRobot Cloud, built on AWS, helped Trupanion create an automated method for building data models using machine learning that reduced the time required to process claims from minutes to seconds. Join our webinar to hear how Trupanion transformed itself into an AI-driven organization, with robust data analysis and data science project prototyping that empowered the company to make better decisions and optimize business processes in less time and at a reduced cost. Join our webinar to learn: Why you don’t need to be an expert in data science to create accurate predictive models. How you can build and deploy pr
Tags : 
     AWS
By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
     AWS
By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
     AWS
By: List Sotheby's International Realty, Singapore     Published Date: Jun 11, 2019
The former Keppel Harbour was transformed into the vibrant marina-waterfront living precinct that it is today. To date, the Keppel Bay waterfront is lined by three iconic residential developments – Caribbean At Keppel Bay, Reflections At Keppel Bay and Corals At Keppel Bay – with a total of 2,464 apartments. As the Keppel Bay precinct matures over the years, the marina-waterfront housing lifestyle has taken roots and offers an attractive living concept to prospective buyers. Being situated on the mainland, Keppel Bay also have the advantage of being closer to amenities and have better accessibility and connectivity. Following the announced extension of the CCL to include three more stations (Keppel, Cantonment and Prince Edward) to close the circle, Keppel Bay will be directly connected to Marina Bay in the Downtown Core. When these stations are in operation by 2025, travel time between Keppel Bay and the CBD will be reduced by one-third of the current travel time.
Tags : 
     List Sotheby's International Realty, Singapore
By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : investors, schneider electric, - colocation provider, attracting investors, colo data center
     Schneider Electric
By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
     KPMG
By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
     Motorola Solutions
By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
     BeyondTrust
By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
     Citrix Systems
By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
     Schneider Electric
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.