mobile data

Results 701 - 706 of 706Sort Results By: Published Date | Title | Company Name

"IDC Technology Spotlight: Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking,

Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable

Adsquare case study

Published By: HERE Technologies     Published Date: Sep 26, 2018
Mobile has become the first screen for consumers in terms of internet time spent. Hyperlocal location data is unique to mobile and provides a lot of new, valuable information about consumers. Today’s sophisticated buyers demand more transparency in location data science, better campaign performance and ROI from attribution modeling. Finding the right partner that can help build the bridge between real-world consumer behavior and mobile programmatic advertising in a transparent way is essential. To meet those challenges and address the demand for top quality location data, adsquare integrated a global database of HERE Places in April 2017. By leveraging HERE Places and overlaying raw location data of anonymous users with POI data points, adsquare is able to understand exactly what consumers are doing in the real world: what places they visit, when and how often. To find out more download this paper today.
Tags : 
    
HERE Technologies

How Adaptive Signage Boosts Store Performance?

Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel

Security’s new frontier: The Cloud

Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA

The journey to AI and business-ready data begins with information architecture

Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Data is multiplying rapidly in quantity and variety for enterprises of all kinds. In multicloud environments, a range of data sources is exponentially increasing the stream of incoming information, from the Internet of Things and social media, to mobile devices, virtual reality implementations and optical tracking. While organizations are readily investing in artificial intelligence (AI), most haven’t done due diligence to understand their data or ensure the quality of data needed to benefit from AI solutions. In many organizations, their data is inaccessible, unreliable, or non-compliant with data privacy and protection rules.
Tags : 
    
Group M_IBM Q4'19

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics.

Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.