day

Results 1 - 25 of 6218Sort Results By: Published Date | Title | Company Name

Conversational Unified Communications

Published By: Spectrum Enterprise     Published Date: Aug 22, 2019
Hello, greetings, and welcome to Conversational Unified Communications. I’m Brien Posey. For those of you who don’t know me, I am a long time Conversational Geek author, and 17-time Microsoft MVP. My professional background is in both IT and in commercial astronautics. It’s an odd combination for sure. I sometimes find myself setting up virtual machines on one day, and being strapped into a space capsule the next day (seriously). Thankfully, Peter, Nick, and the rest of the folks at Conversational Geek have embraced my unorthodox (dare I say eccentric) career choices and have allowed me to author books on subjects ranging from the cloud computing to real life rocket science. I would like to personally invite you to go to ConversationalGeek.com and check out some of these other books. In this book, I want to talk about unified communications. Those of you who follow my work may recall that back in 2009 I wrote another book about unified communications called Brien Posey’s Guide to Pract
Tags : 
    
Spectrum Enterprise

The Guide to Delivering True Omnichannel Support

Published By: Kustomer     Published Date: Aug 27, 2019
The modern-day customer expects their needs to be met immediately, no matter the channel. Drive meaningful customer relationships, increase revenue streams and improve operational performance, with omnichannel support.
Tags : 
customer service, customer support, customer experience, customer service software, “conversational commerce, omnichannel support, omnichannel customer service, omnichannel customer support
    
Kustomer

The Higher Education Guide to Choosing a Learning Management Platform

Published By: Instructure     Published Date: Aug 27, 2019
Need some help picking a learning management platform? The right learning management platform can play a huge role in your institution’s success, including that of faculty and students. Therefore, you have some homework to do. Don’t worry, we’ve made it easy. Read our Higher Education Guide to choosing a Learning Management Platform for insights on: • Understanding how a true Learning Management Platform should work • Identifying the unique needs and wants of your users • Aligning a platform to your institution’s goals • Planning for future scalability • And more. Get your guide today and study up on how to choose a great learning management platform for your institution!
Tags : 
    
Instructure

The Future of Insurance and Artificial Intelligence

Published By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA

A smarter way to authenticate customers

Published By: KPMG     Published Date: Sep 04, 2019
Key considerations when developing a strong and customer-friendly approach to intelligent authentication. Bank fraud is on the rise. In fact, according to a recent survey of 43 major banks around the world, it’s not just the number of fraud cases that is going up; so, too, is the value of fraud overall. In large part, this increase in fraud is the result of identity theft scams. Rather than attempting some sort of high-stakes virtual bank heist for all the gold in the vault, most online thieves seem content simply stealing money from every-day customer’s accounts when they aren’t looking.
Tags : 
    
KPMG

How Malware and Bots Steal Your Data

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd

Automation's Rising Tide: How to Manage Bots in Today's World

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd

The Next Wave of Bot-Driven Brute Force Attacks

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd

eBook: Legal Practice in a Hyper-Connected World

Published By: Blackberry     Published Date: Jul 12, 2019
Technology is changing the way that businesses across industries operate. Often referred to as “digital transformation” or “digitization,” this change is rapid, and it is relentless. It touches everything in the legal profession from the completion of everyday tasks to the way information is secured and shared
Tags : 
    
Blackberry

Adapt or Die: How Corrigo helps you thrive in the Intelligence Economy

Published By: Corrigo     Published Date: Sep 12, 2019
We’re living in a new era defined by data, analytics, and intelligence. It can sound overwhelming, but once you understand how to make all this information work for you, it becomes really exciting. The Intelligence Economy has already changed our day-to-day lives, and it’s revolutionizing the world of facilities management. The best FMs don’t just understand this change – they embrace it. With a better handle on intelligence, you will see immediate results. From warranty enforcement to asset repair vs. replacement decisions, Corrigo’s collective intelligence can improve your bottom line and make you better at your job. Read on to learn how Corrigo makes the Intelligence Economy work for you.
Tags : 
    
Corrigo

Disaggregation and the Virtual Network

Published By: Intel     Published Date: Aug 26, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel

Understanding Industrial Transformation Today

Published By: Schneider Electric     Published Date: Jul 01, 2019
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers. Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Tags : 
digital, industry 4.0, automation, plant
    
Schneider Electric

Building a Business Case for Hyperconverged Infrastructure

Published By: Nutanix     Published Date: Aug 22, 2019
Today, companies of all sizes face growing threats from shifting consumer habits, global competitors, and well-funded startups. Digital transformation, cloud computing, and the dynamic nature of global business have changed business expectations, making IT an essential driver of revenue and an ever more critical part of your business. Your IT team is looking for ways to accelerate the adoption of digital technologies to increase customer engagement, streamline business processes, and gain a sustainable competitive advantage.
Tags : 
    
Nutanix

Too Much of a Good Thing? Enterprise Cybersecurity Adoption Trends across Asia-Pacific

Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

Next Generation SOCs – New Processes Enhance Cybersecurity

Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

(ISC)2 Webinar: Why Should I Care About SSL/TLS?

Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon

Test and Deploy New Cybersecurity Technologies Faster

Published By: Gigamon     Published Date: Sep 03, 2019
With new threats emerging every day, IT organizations need to frequently upgrade or introduce new cybersecurity tools and technologies. The problem is that it can be very difficult to set up realistic tests that show how technologies will perform under real-world conditions.
Tags : 
    
Gigamon

EMA Report: Understanding the Value of Application-Aware Network Operations

Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon

The 9 most common AWS deployment questions, answered

Published By: Rackspace     Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
Tags : 
    
Rackspace

Obstacles of Modern Customer Engagement

Published By: SiteImprove     Published Date: Sep 13, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove

IBM Storwize V5000 – Ease of Use for All Environments

Published By: IBM APAC     Published Date: Jul 19, 2019
Today’s IT organisations want simple, flexible storage infrastructures. IBM’s Storwize V5000 family of solutions are a fast, highly flexible, easy-to-use virtualised storage system that helps businesses to meet the challenges of rapid data growth in the context of limited IT budgets. This ESG report looks at the role the IBM Storwize V5000 family can have on addressing the storage needs of companies today.
Tags : 
    
IBM APAC

Your Most Intelligent Associate: Ecommerce in Modern Retail

Published By: Oracle     Published Date: Sep 12, 2019
The following guide looks at 6 characteristics that define today’s most compelling commerce environments, and how the right mix of adaptive, intelligent solutions can optimize performance and ultimately be your most intelligent associate, 24 hours a day, 7 days a week, anywhere in the world. Amp Up the Power of Commerce with AI and Analytics Bring the Customer Journey Full Circle Tap into Heightened Data Security and Privacy in the Cloud
Tags : 
    
Oracle

Six Degrees of Network Security

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, you’ll be protecting your network against today’s threats and beyond. "
Tags : 
    
Cisco Umbrella EMEA

Security Readout: 2019 Trends for Remote and Roaming User Security

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA

Protect Your Organization From Unwanted Cryptomining 

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.