bi systems

Results 776 - 794 of 794Sort Results By: Published Date | Title | Company Name

The Business Value of Progress Health Cloud

Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress

CrowdStrike Threat Graph™: Stopping Breaches with Graph Data Models and Analytics

Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike

Discover the value of focusing on intelligent capture

Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities
    
OnBase by Hyland

Modern Storage Accelerates Data Insights, Speeding Innovation

Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifi cally to work with high-powered analytics.
Tags : 
    
Pure Storage

Modern Storage Accelerates Data Insights, Speeding Innovation

Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artificial intelligence within the Financial Services industry, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage

Predictive Malware Response Test

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

Gartner CARTA

Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon

The Organizational Road Map to Workforce Freedom

Published By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : 
digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
    
Insight

Six Reasons to Upgrade Your Database

Published By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
database, streamlining, it infrastructure, database systems
    
Group M_IBM Q1'18

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM

IBM IBV: The next-generation platform for banks

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Sophisticated banking requires sophisticated computing systems. But which systems offer the greatest chance for success? Many banks are discovering that the answer can be found within their on-premise data centers – the mainframe computer. Mainframes have become a modern platform for innovation. When operating in a hybrid cloud environment, mainframes provide cost flexibility, scalability, agility, sophistication and unmatched security. And they support innovation, business transformation and new types of monetization. The power of mainframe computing is being rediscovered. Specifically, in a recent 2017 survey of banking executives, we found that: • 50 percent said they believe hybrid cloud – and the systems that underpin it – can significantly lower the cost of IT ownership • 47 percent said they believe mainframe enabled hybrid cloud can improve operating margin • 47 percent said they believe dual-platform hybrid cloud can accelerate innovation. While innovation and improved p
Tags : 
    
Group M_IBM Q418

Independence, in name and fact: Global Pharmaceutical Manufacturer

Published By: KPMG     Published Date: Sep 17, 2018
The leadership of a new, marquee pharma manufacturer approached KPMG with a paradox: It was certainly marquee, but not new. As the highly publicized spin-off of a global health services conglomerate, the company began life with $18 billion in annual revenues, an established product pipeline and instant membership in the S&P 100. Reliant on the back-office functions of its parent, it needed to quickly acquire the back-office sinews of a truly stand-alone company: ERP systems and core processes for finance, operations and human resources. During an intensive three-year engagement, KPMG brought the vision of the company’s leaders to life, working towards a target operating model through the disciplined implementation of new systems, processes, training and staffing. The multidisciplinary approach eventually touched the lives of every one of the company’s 21,000 employees, in 170 countries. And as KPMG’s delivered tangible results, something intangible emerged – a new company culture, inde
Tags : 
    
KPMG

Libro bianco: Il nuovo mondo nella manifattura termoplastica

Published By: 3D Systems     Published Date: Feb 28, 2019
Riscrivi le regole dello stampaggio a iniezione con stampanti e materiali di produzione additiva di 3D Systems nella termoplastica. La tecnologia di sinterizzazione laser selettiva (SLS) è al centro dell'attenzione e in forte crescita nella produzione di massa personalizzata e nella prototipazione funzionale. Le giuste tecnologie additive, i materiali e le finiture stanno trasformando il modo di produrre. La manifattura termoplastica diretta digitale offre una qualità eccezionale che apre la porta a nuovi parametri di design non attuabili con il tradizionale stampaggio a iniezione. La produzione additiva di termoplastici evita anche i lunghi tempi di consegna e gli investimenti iniziali negli stampi e nelle attrezzature per lo stampaggio a iniezione. Se si misurano i pezzi finiti sui tre parametri: qualità, "time to market" e costo per metro cubo, in molte situazioni l'SLS industriale porta a una soluzione globalmente migliore. 3D Systems offre un'ampia varietà di materiali termoplas
Tags : 
    
3D Systems

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust

Cloud Security Spotlight

Published By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Alert Logic

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Verifying Digital Identities Beyond One Time Passwords

Published By: BehavioSec     Published Date: Sep 30, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.