• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

com

Results 226 - 250 of 23064Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
By: Sage EMEA     Published Date: Sep 02, 2019
The complete guide to understanding the technology available for better efficiency and customer experience. As customer demands and expectations are revolutionising the service industry, service providers are embracing the outcome economy to remain relevant and gain market share. This means a shift in focus from competing through selling products and services, to competing on delivering measurable results and outcomes that are important to the customer.
Tags : 
    
Sage EMEA
By: FICO EMEA     Published Date: Aug 30, 2019
Fraud is a serious concern for the communications industry, with proceeds and services used by organised crime and terrorist networks. Whilst reliable statistics are difficult to come by, industry association Communications Fraud Control Association (CFCA) estimates the total global fraud loss at around $29bn annually. Of this, over $7bn is attributed to subscription fraud and account takeover. In an industry which is undergoing widespread digital transformation to streamline customer journeys and reduce operating costs through automation, preventing fraud is critical. Learn More
Tags : 
telecom subscription fraud, prevent fraud, fight fraud
    
FICO EMEA
By: FICO EMEA     Published Date: Aug 30, 2019
Telecommunications companies lost more than $29 billion to consumer fraud in 2017 globally (1.27% of their revenues). The largest and most advanced communications service providers (CSPs) have sophisticated fraud detection systems and processes in place, but those organizations are now questioning their fraud readiness. Are they doing enough? Fraudsters may be individuals or increasingly sophisticated criminal networks. They constantly develop new methods and target new lines of business Read this interview where Anat Hoida, Head of the FICO’s Telecom Practice in Europe, Middle East, and Africa, discusses the impacts of the evolving spectrum of fraud risks on the growth and competitiveness of CSPs globally.
Tags : 
telecom subscription fraud, prevent fraud, fight fraud using analytics
    
FICO EMEA
By: 3M     Published Date: Aug 30, 2019
The prevalent use of paints and coatings across many industries and organizations presents a variety of workplace hazards. In many cases, selection and use of appropriate personal protective equipment (PPE) is necessary to help control exposures. Respiratory and skin contact hazards are common across most applications. Depending on the type of paint or coating and the specific use conditions, other hazards may be present. These can include fire and explosion hazards, electric shock, fall hazards, excessive noise and other. Prior to selecting PPE for any painting operation, a hazard assessment completed by a qualified health and safety professional is necessary to evaluate exposure risks potentially present.
Tags : 
    
3M
By: Label Insight     Published Date: Aug 30, 2019
Check out the infographic to learn how to win at grocery e-commerce
Tags : 
    
Label Insight
By: MicroStrategy     Published Date: Aug 29, 2019
Dresner Advisory Services’ eighth annual Cloud Computing and Business Intelligence Market Study in 2019 shows user confidence at an all-time high, with cloud offerings outnumbering traditional on-premises offerings. Sentiment toward cloud and cloud BI turned sharply positive in 2018, with current and future user plans both trending up. Results from our 2019 Dresner Advisory Services New Year User Survey reinforced those findings with ongoing momentum. Sentiment is at an all-time high, and the majority of organizations—51 percent—use cloud BI in 2019. Cloud-based BI vendor products and services are now more plentiful than traditional onpremises products. Still, vendors support any deployment option the customer chooses: public, private, or hybrid, at multiple levels of scale and price. Customers benefit from these choices, which reduce the chance for vendor lock-in. Users have not settled on deployment models but are migrating toward subscription and the adoption of managed services. Ou
Tags : 
    
MicroStrategy
By: Spectrum Enterprise     Published Date: Aug 29, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise
By: Spectrum Enterprise     Published Date: Aug 29, 2019
Clients are benefiting from a rapidly evolving fiber Internet landscape and the associated competition among providers. Choosing the right vendor from among the many vying for your business requires careful consideration of how each operates. Take into account, for example, expertise and experience, breadth of services and support and investment in infrastructure.
Tags : 
    
Spectrum Enterprise
By: Spectrum Enterprise     Published Date: Aug 29, 2019
Many businesses attempting to implement digital strategies are held back by subpar Internet connectivity. Networks with insufficient bandwidth and inconsistent performance cause a wide range of problems that prevent businesses from competing effectively. Such issues can range from unsatisfying online experiences for customers to unreliable connectivity for employees to the inability to run latency-sensitive applications and share large files. In short, their networks are delivering poor value that affects nearly all areas of their businesses.
Tags : 
    
Spectrum Enterprise
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Organizations that create and deliver software — whether for their own IT operations, for the packaged applications market, or as the core of their final product, as in the systems space — must grapple not only with today’s competitive landscape, but also with increased complexity in their processes and supply chains. Many factors serve to complicate software delivery, but differentiation lies at the heart of managing this complexity. This smartpaper explores how effective quality management creates opportunities to deliver key business benefits, such as improved market share, higher customer satisfaction, and increased brand equity.
Tags : 
    
Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today's automotive engineers are faced with rising product complexity and the need to innovate their methods in order to remain competitive. This infographic will help to paint a picture of the impact of rising complexity on the auto industry and provide a roadmap for embracing digital transformation.
Tags : 
    
Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Read the insights from MIT Technology Review around how engineering teams can use AI and IoT technology to cope with rising product complexity and accelerate innovation.
Tags : 
    
Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Which of your applications should move to the cloud? Is public, private, or hybrid cloud the right choice? And should you use containers, or Platform-as-a-Service technologies? Whether you’re trying to optimize your existing landscape, strengthen your foundation, or innovate with newer technologies that are delivered via cloud platforms, you need to know where to start. In this webcast, hear how IBM helped The Tribune Publishing Company build an effective plan to accelerate their digital transformation. Learn how IBM can also help you analyze your full portfolio, identify opportunities to optimize and automate your infrastructure and determine which applications to move, and the potential business value.
Tags : 
    
Group M_IBM Q3'19
By: 3D Systems     Published Date: Aug 29, 2019
As a mold maker, you have probably experienced challenges with your current software including working with multiple solutions, inefficient mold design capabilities, poor technical support and many more. By switching to an integrated CAD/CAM software that’s dedicated for mold design and manufacturing, you can reduce delivery times, improve tool quality and gain a competitive advantage. Download this whitepaper to learn more about why you need an integrated solution, as well as the key elements to look for in a CAD/CAM solution.
Tags : 
cad cam, cad/cam, cad/cam software, cad software, cam software, mold, mold design, mold design software, injection molding, injection mold, injection mould, injection moulding, injection mold design, plastic mold design, cad cam software, milling, machining, tooling, electrode, cimatron
    
3D Systems
By: Sift     Published Date: Aug 29, 2019
As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach
Tags : 
    
Sift
By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian
By: MicroStrategy     Published Date: Aug 28, 2019
Over the last decade, the enterprise analytics landscape has dramatically transformed. Vendors have come and gone, and platforms have continually expanded their offerings to include new functionality and keep pace with the demands of the businesses they serve. Originally envisioned as an IT-centric tool for enterprise reporting, analytics today has evolved into a business solution—empowering a range of users across every line of business, including front-line employees, field personnel, and executives. The rise of self-service analytics over the past decade has played a key role in promoting a data-driven mindset within every business function. However, this practice is limited to a skilled few. The vast majority of business professionals lack the time, analytical skills, or inclination to conduct their own analyses, and fail to effectively use analytics on a day-to-day basis. The result? Despite decades of investments, BI adoption at most organizations remains at 30%. The failure of e
Tags : 
    
MicroStrategy
By: BlackLine     Published Date: Aug 28, 2019
Validating the completeness and accuracy of sales (and related balance sheet impact) is of paramount importance, but often requires significant manual effort. As revenues grow, organizations are forced to devote additional resources to processes like sales audit and other detailed reconciliations or expose themselves to risk. For the retail industry, having an adequate sales audit process is crucial to the integrity of financial statements. And innovations like new forms of consumer payments and omni-channel models only add to the complexity.
Tags : 
    
BlackLine
By: igus     Published Date: Aug 28, 2019
Cable carriers, sometimes referred to as cat tracks, drag chains or energy chains, can be manufactured in many ways. They can be made with different materials, such as steel or plastic, and they can have simple lightweight designs or complex multi-axis configurations. But how do you know which carrier is best for your application? Choosing the right energy chain is crucial because it offers the following benefits: Longer service life for cables and hoses Improved machine safety Reduced operating costs Read this basics guide to discover a range of cable carrier design and material options, as well as tips for selecting the ideal energy chain. You can also review installation guidelines for maximizing the service life of your cable carrier and the energy supply system it protects.
Tags : 
    
igus
By: PwC     Published Date: Aug 28, 2019
Companies typically begin with a basic approach to sales tax: figure out the requirements of the state in which they’re headquartered, register with that state, and start collecting sales tax from customers in that state. That approach may work for a while, but as your business expands into new states (whether you have a physical presence there or not), the risk of non-compliance with sales tax becomes significant. Smart finance leaders know they need to have a sales tax compliance strategy before they start getting notices from state tax authorities.
Tags : 
    
PwC
By: FICO EMEA     Published Date: Aug 28, 2019
Synthetic Identity Fraud is growing in both scope and complexity. As your fraud protection efforts succeed in some areas of your business, fraudsters are devising new ways to penetrate your defenses. Do you understand the concepts of Bust Out Fraud, Data Furnishing, and Piggybacking? These are just some of the new techniques that fraudsters are using to exploit the holes in your fraud defenses. Download the eBook "Synthetic Identities: Are You Chasing Invisible Footprints?" This insightful eBook illustrates the aggressive techniques that fraudsters are using and answers questions such as: What are the six major factors driving the growth in Synthetic Identity Fraud? How are synthetic identities used? What are Bust Out Fraud, Data Furnishing, and Piggybacking, and how do they work? Perhaps more importantly, what are the state-of-the-art strategies used to fight these increasingly sophisticated fraud techniques?
Tags : 
synthetic identity fraud, manage fraud
    
FICO EMEA
By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest “NonLinear ADaptivity” (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the “true” design solution.
Tags : 
    
ANSYS
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter