• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

property

Results 1 - 25 of 150Sort Results By: Published Date | Title | Company Name
By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
    
Limelight Network
By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS
By: Four Winds Interactive     Published Date: Jul 19, 2019
The consistent delivery of an unmatched guest experience doesn’t happen by accident. It takes an unyielding dedication to excellence. And after more than 12 years of designing purpose-built digital signage solutions for the hospitality industry, we know what it takes to provide enduring value for your guests while also making content management easy for each of your end users.
Tags : 
    
Four Winds Interactive
By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
By: Darktrace     Published Date: Jun 21, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
The modern technology sector is uniquely defined by transformative ideas. As a consequence, today’s tech companies invest enormous resources in both material and human capital to foster such ideas, with the recognition that its success ultimately hinges on its intellectual property.
Tags : 
    
Darktrace
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
By: Motorola Solutions     Published Date: Apr 26, 2019
Rosen Hotels & Resorts was looking to improve its two-way radio communications. The organization had an aging analog radio system to support its existing properties, with the main antenna located at its tallest building, the 24-story Rosen Centre Hotel. However, with the opening of a new property, Rosen Shingle Creek, the lack of wide area coverage became an immediate concern. Employees situated across departments such as catering, engineering and security, and subpar radio connections hindered collaboration and a real-time flow of information.
Tags : 
    
Motorola Solutions
By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their intellectual property, such as data and business rules. In addition, businesses need a set of hybrid cloud services that provides the best of both worlds: the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. Welcome to IBM LinuxONE.
Tags : 
    
Group M_IBM Q2'19
By: SambaSaftey     Published Date: Mar 15, 2019
Regardless of the size of the vehicles, and often despite the utmost caution, operating vehicles can be a risky endeavor. According to the National Highway Transportation Safety Administration, highway accidents accounted for 37,461 deaths in the U.S. in 2016.1 Moreover, a recent study by Motus, a vehicle management and reimbursement platform, found that 40% of all motor vehicle accidents are work-related and cost employers a staggering $56.7 billion in 2017, taking into account medical expenses, property damage, increased insurance premiums, and lost productivity.2 While liability insurance is an important way for employers to address that risk, it’s by no means a panacea. Companies can and should be doing more to lessen the likelihood of accidents in the first place. And given that the vast majority (94%, according to NHTSA’s study) stem from driver-related actions or inactions as opposed to equipment malfunctions, one of the most important ways of doing so is to ensure that the in
Tags : 
    
SambaSaftey
By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi
    
Comcast Business
By: Sparton Corporation     Published Date: Jan 08, 2019
With the cost of manufacturing in China escalating, companies are increasingly looking to Southeast Asia for an alternative to meet their outsource manufacturing needs. Emerging as the leading alternative to China, Vietnam is now a destination choice for outsource manufacturing due to the unique financial advantages it can provide companies, including those in high-tech segments such as medical and commercial aerospace. In addition to lowering total costs, Vietnam offers companies a larger labor force, strong IP protection, and reliable quality in the manufacturing process, among other benefits. Moving their contract manufacturing to Vietnam can provide companies an excellent foundation for long-term profits and sustained growth.
Tags : 
china, vietnam, southeast asia, manufacturing, cost, outsource, high-tech, commercial aerospace
    
Sparton Corporation
By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
    
AWS
By: Group M_IBM Q418     Published Date: Oct 04, 2018
IBM Cloud Migration Services provides migration and modernization of your workloads and applications from anywhere to anywhere. It accelerates your journey to cloud through proven processes, tools and intellectual property. IBM uses automated and optimized patterns in the Cloud Migration Services to deliver cloud ROI faster and increases your opportunity for success.
Tags : 
    
Group M_IBM Q418
By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter