imi

Results 1 - 25 of 5778Sort Results By: Published Date | Title | Company Name

Essentiële beveiligingsinformatie voor MKB-bedrijven

Published By: Cisco EMEA     Published Date: Oct 01, 2019
Leer hoe het huidige MKB-landschap van cyberbedreigingen eruitziet, zodat uw bedrijf kan overleven, operationele kosten kan terugdringen en beveiligd kan groeien. Maak van beveiliging een prioriteit van iedereen en bescherm uw bedrijf met Cisco. Naarmate uw bedrijf groeit, trekt het de aandacht. Maar niet alle aandacht is welkom. Steeds meer geraffineerde criminele bendes hebben hun pijlen gericht op MKB-bedrijven.
Tags : 
    
Cisco EMEA

Voici trois mesures simples qui vous aideront à protéger votre entreprise contre les cyberattaques.

Published By: Dell SB     Published Date: Aug 27, 2019
Bon nombre de propriétaires de PME pensent que cela n’arrive qu’aux autres et que leur entreprise est trop petite pour être la cible de piratages, d’attaques par rançongiciel et d’autres types de cybercriminalité. D’autres sont conscients de l’importance de la cybersécurité, mais estiment qu’ils n’ont pas les ressources nécessaires pour en faire une priorité. Ce sont là quelques-unes des raisons pour lesquelles pas moins de 90 % des PME n’ont pas établi de système de protection pour leurs données ou celles de leurs clients.
Tags : 
    
Dell SB

Allez plus loin avec les solutions technologiques adaptées

Published By: Dell SB     Published Date: Aug 27, 2019
Vous essayez de lancer ou de faire évoluer une entreprise, et chaque minute compte. Gagnez du temps et augmentez votre productivité en optimisant votre technologie. Des modifications simples, comme choisir la mémoire Intel® Optane™ et migrer vers Windows 10 Professionnel, peuvent vous aider à accomplir vos tâches quotidiennes plus rapidement et vous laisser plus de temps pour vous consacrer à l’innovation. Renseignez-vous sur ces stratégies afin de simplifier vos journées de travail.
Tags : 
    
Dell SB

Technologielösungen für gesteigerte Produktivität

Published By: Dell SB     Published Date: Aug 27, 2019
Sie möchten ein Unternehmen gründen oder weiter ausbauen – dabei zählt jede Minute. Sparen Sie Zeit und erhöhen Sie die Produktivität, indem Sie Ihre Technologie optimieren. Mit dem einfachen Wechsel zum Intel® Optane™ Speicher und der Migration zu Windows 10 Pro erledigen Sie alltägliche Aufgaben schneller und haben mehr Zeit für Innovationen. Im Folgenden finden Sie einige Strategien zur Optimierung Ihres Arbeitstags.
Tags : 
    
Dell SB

Frost and Sullivan: Best Practices for Hybrid IT - Tips for Midsized Businesses

Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Businesses of all sizes and industries have struggled to implement a hybrid IT environment that can meet their most critical needs, without disrupting business. The challenge is especially acute for midsized firms whose limited IT resources are facing pressure to adopt a never-ending torrent of technology innovations. In an effort to create a hybrid IT environment, many businesses end up with a multiple siloed infrastructure deployment options that consume increasing amounts of management time, effort and budget, while never quite meeting business needs.
Tags : 
    
Hewlett Packard Enterprise

IDC Paper: Why Organizations Need an Intelligent Data Strategy

Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn about the HPE Intelligent Data Platform and the new IT realities it addresses. With digital transformation underway in many organizations, more dynamic business models are becoming the key to success. This means infrastructure modernization and the introduction of technologies such as solid state storage, artificial intelligence and machine learning, software-defined infrastructure, and the cloud. At the same time, it means IT infrastructure management becomes much more complex. Enter HPE’s Intelligent Data Platform. With comprehensive coverage and AI/ML-driven real-time optimization that enables intelligent management of the entire data life cycle, the HPE Intelligent Data Platform enables an organization to get the most out of its IT resources while also meeting its evolving needs over time.
Tags : 
    
Hewlett Packard Enterprise

UNLOCK COMPETITIVE ADVANTAGES WITH SHELL NEXT-GENERATION GAS-TO-LIQUIDS PROCESS OILS

Published By: Shell U.K. Limited     Published Date: Sep 05, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage. [478] Have you ever experienced product quality issues caused by variations in process oil batches? Do you need a low-viscosity process oil, but have concerns about the effect of volatiles on working conditions? Could you offer enhanced products if you had process oils with distinct characteristics, for example, an extremely narrow hydrocarbon distribution range? Our GTL process oils contain a high proportion of paraffinic hydrocarbons and are very pure, which provides key qualities for many applications. For in
Tags : 
shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure, volatility, colourless, colorless, odourless, odorless, viscosity index
    
Shell U.K. Limited

Top 10 Security Myths Debunked

Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware

Produttività nell'ambiente di lavoro

Published By: Dell EMEA     Published Date: Sep 09, 2019
Quando si tratta di longevità, nessuno può reggere il confronto con Dell. Oltre a fornire capacità, gestibilità e funzionalità di protezione scelte dai dipartimenti IT, i nostri computer sono anche progettati per garantire cicli di vita più duraturi, con una conseguente riduzione degli sprechi. Non c'è da stupirsi che riscuotano successo nel mercato da così tanto tempo. Ma basta guardare al passato, parliamo piuttosto delle nuove funzionalità innovative. Il Latitude 7400 2-in-1 utilizza la nuova tecnologia ExpressSign-in di Dell che rileva la presenza dell'utente, attiva il sistema in circa un secondo e consente di effettuare l'accesso mediante riconoscimento facciale con Windows Hello. Gli utenti possono semplicemente sedersi alla scrivania e iniziare a lavorare, senza necessità di utilizzare combinazioni da tastiera per cambiare utente o addirittura toccare il tasto di accensione. Di fatto, è il primo PC al mondo a utilizzare un sensore di prossimità con tecnologia Intel® Context Se
Tags : 
    
Dell EMEA

How Away Delivers Streamlined and Personalized Customer Service

Published By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “personalized customer service”, “personalized customer support”, “personalized customer experience”, “customer support insights”, “customer service personalization”, “customer support personalization”, “customer experience personalization”
    
Kustomer

The Importance of Personalizing Your Retail Customer Service

Published By: Kustomer     Published Date: Sep 13, 2019
To succeed in this new era of customer service, retailers must figure out how to personalize the way they connect with customers. Find out why personalizing your support strategy is crucial for your business — and how to do it.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “personalized customer service”, “personalized customer support”, “personalized customer experience”, “customer support
    
Kustomer

How Malware and Bots Steal Your Data

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd

Automation's Rising Tide: How to Manage Bots in Today's World

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd

The Distributed Cloud: Infrastructure at the Edge

Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel

Is Noise Pollution Making Your Data Less Secure?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd

The Next Wave of the Bot-Driven Brute Force Attack

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd

Automation's Rising Tide: How To Manage Bots In Today's World

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd

The Distributed Cloud: Infrastructure at the Edge (Korean)

Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel

Obstacles of Modern Customer Engagement

Published By: SiteImprove     Published Date: Oct 02, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove

Insight: Optimising the supply chain through digital transformation

Published By: KPMG     Published Date: Jun 10, 2019
Develop practical strategies for success and manage the risks associated with supply chain transformation. Read this insight to find out about: • the digital solutions companies are using to reshape their supply chains • the benefits they realise as a result • how to identify opportunities for optimisation in your own supply chain • which practical strategies to deploy for successful digital transformation.
Tags : 
    
KPMG

Transformation story: Improve performance by making smarter decisions

Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG

Guide: Designing and operating supply chains for a digital world

Published By: KPMG     Published Date: Jun 10, 2019
Whether you want to optimise existing processes or transform entire operations, find practical advice on building digital solutions into your supply chain. Read this guide to find out • why defining your performance ambition must be the first step • how to draw up a digital roadmap • how deploying digital solutions will impact your workforce • what partners you will need to realise your vision • practical examples from real companies.
Tags : 
    
KPMG

Webinar: The Evolution of Customer Privacy – is your organisation keeping pace?

Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG

Malicious Cryptominers are Eying Your Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA

Miners in the Shadows: Extracting Treasure with Stolen Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.