sophisticated

Results 1 - 25 of 406Sort Results By: Published Date | Title | Company Name

Unwrapping Holiday Fraud: Insights to Protect Your Business & Drive eCommerce Revenue

Published By: Riskified     Published Date: Nov 04, 2019
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We’ve identified six key ‘sub-seasons’ and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season. This report explores how merchants can stay competitive and boost revenue, while meeting the sophisticated expectations of holiday shoppers. What you will get from this report: 1. Tools to enable more cross-border eCommerce: Get insights to help you capitalize on the holiday season’s opportunities 2. Fraud trends for different segments of the holiday season: Better manage risk during the most lucrative quarter for eCommerce merchants 3. Insights on six key holiday sub-seasons: Identify unique consumer preferences to boost revenue
Tags : 
    
Riskified

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

Three Initiatives that Drive Up Infrastructure and Storage Value

Published By: Dell EMC     Published Date: Oct 30, 2019
As data volumes grow larger every year, businesses that adopt more sophisticated approaches to storing and deriving value from that data benefit in terms of performance, scalability, and cost. How do you migrate effectively to the latest storage and infrastructure technologies, while also mitigating the associated disruption and risk? Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC

Intelligent Fraud Management – Banking and Insurance - Webinar

Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software

AA Ireland Transforms Itself and Insures Predictable Success

Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software

Accelerating Industry Compliance for standards like ASPICE ISO-26262 with IBM Engineering Life cycle

Published By: Group M_IBM Q4'19     Published Date: Nov 06, 2019
This presentation takes you through the auto industry's move toward more sophisticated levels of compliance among suppliers and OEMs. Learn how achieving ASPICE can be integrated into your engineering 'v' model for improved workflow and built-in tools for achieving compliance.
Tags : 
    
Group M_IBM Q4'19

Top 5 Recommendations for Effective Threat Detection

Published By: Alert Logic     Published Date: Oct 25, 2019
In today’s threat landscape, attackers use a wide range of sophisticated methods to infiltrate vulnerable systems. The key to minimizing the impact of an attack is to detect threats early, effectively and over a long period of time. In any threat detection effort, organizations must focus on visibility, assessment of risk, and potential impact to the business. Download 5 Top Recommendations for Effective Threat Detection to learn how to improve the effectiveness of your threat detection program in cloud and hybrid environments.
Tags : 
    
Alert Logic

Solution Brief: SIEMLESS Threat Management

Published By: Alert Logic     Published Date: Oct 25, 2019
As the variety and sophistication of exploits continues to grow, even large, mature Fortune 100 security teams feel unprotected. How well are your security systems and tools doing blocking threats from the most sophisticated cybercriminals? Download this resource to learn about a threat management approach designed to address today’s evolving cybersecurity threats, expanding compliance risks, and all-too-common resource constraints.
Tags : 
    
Alert Logic

Building Secure Applications: Recommendations for Financial Services

Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx

Creating Sophisticated Employees in the Age of Automation

Published By: ttec     Published Date: Jul 24, 2019
By the time most customers reach a human employee with a question, chances are they have already researched online or tried to self-serve. This means employee transformation is required to develop more sophisticated employees in the age of automation to solve more advanced customer issues. Because front-line jobs are becoming more complex, employees need to be tactical, technical, and ready to emotionally handle these new types of interactions. Recently, Lamont Exeter, head of Learning & Development at TTEC Digital, teamed up with Tim Duranleau of SAP Litmos in a webinar to discuss ways that companies can combine learning and technology to create more sophisticated employees. Below are some key highlights from the discussion.
Tags : 
    
ttec

Small Business Security Essentials

Published By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
    
Cisco EMEA

Small Business Security Essentials - Stay ahead of the game on security

Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
security, cyber threat, cisco
    
Cisco EMEA

The Decision Matrix: Selecting a RPA Platform

Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority – and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally aren’t a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
    
Automation Anywhere APAC

The Location Buyers’ Guide for Marketers

Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

The Data Scientists’ Guide to Buying Location Data

Published By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences – and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

The Marketers’ Guide to Buying Location Data

Published By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

How to prevent identity fraud with location intelligence

Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies

HPE Locks Down Server Security

Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise

Embrace Risk: Secure Your Hybrid Cloud

Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise

Finding the Right Balance

Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise

HPE Locks Down Server Security

Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise

Addressing the Full Attack Continuum: Before, During, and After an Attack

Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco

Merchandising & The Omnichannel Impact

Published By: SAS     Published Date: Jan 17, 2018
This RSR custom research report explores the impact of omnichannel methods on merchandising, marketing and the supply chain; specifically, what analytical capabilities address the challenges that omnichannel selling and fulfillment pose for retailers. Consumers today routinely begin their shopping journeys online, but complete their purchases in nearby stores, in their “home” stores or delivered directly to their doors. Retail analytics enables organizations to capture data from their customers' journeys. Retailers that successfully deliver relevant omnichannel experiences while gaining a more sophisticated understanding of demand (where and how it is initiated) will enhance their brands’ value and create compelling and profitable customer relationships.
Tags : 
    
SAS

Meeting the Campus IT Challenges of Body Camera Adoption

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The Real Impact of Body Cameras: Unprecedented Secure Storage Demand Body cameras have become a critical component of campus and community policing — they protect everybody’s interests. However, gathering, securing, storing, and managing the terabytes of content created on a monthly basis can be daunting even for the most sophisticated IT teams. In this eBook, we provide a comprehensive look at this growing challenge and how you can get in front of it! Read this eBook now.
Tags : 
lenovo, higher education, body cameras, campus policing, campus security, data managing, securing data, securing content
    
Lenovo and Intel®

Forrester Webcast: Deciphering Development Trends

Published By: Oracle     Published Date: Oct 20, 2017
What do these market-defining trends have in common? · Analytics for all · Analytics as competitive differentiator · Internet of Things · Artificial intelligence/Machine learning/Cognitive computing · Real-time analytics/event management They all rely on data – timely, accurate data delivered within an insightful context – to deliver value. The question is: who in the enterprise is most qualified and prepared to help deliver on the vision and values of the data-driven enterprise? It’s going to take a special type of professional to deliver that value to enterprises. Organizations are seeking professionals to step forward and take the lead, provide guidance and lend expertise to move into the brave new world of digital. The move to digital and all that it entails – sophisticated data analytics, online customer engagement and digital process efficiency – requires, above all, the skills and knowledge associated with handling data and turning it into insights. The move to digital i
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.