system

Results 1 - 25 of 6487Sort Results By: Published Date | Title | Company Name

Catalyst 9300 Stackwise System Architecture

Published By: Cisco     Published Date: Sep 27, 2019
The StackWise-480 architecture allows stacking of up to eight switches in a ring topology to achieve 480G of stack bandwidth. The latest Cisco Catalyst 9300 Series Switches support StackWise-480. This technology is flexible, modular, and evolutionary, and it delivers Cisco IOS XE feature capabilities with hardware acceleration to every port in the stack.
Tags : 
    
Cisco

The ABC's of Executive Analytics: A-List Performance Using BI in the C-Suite

Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen

Core Administration Processing System Decision Guide

Published By: Conduent     Published Date: Jul 23, 2019
In this eBook, we’ve distilled the key information into a “decision guide” to help you head in the right direction with your technology planning. The guide walks you through the five main options for your technology and overviews the benefits and challenges related to each — so you can weigh the pros and cons and make the best technology choices for your organization. Complete the form at right to get your copy today.
Tags : 
    
Conduent

How Away Delivers Streamlined and Personalized Customer Service

Published By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “personalized customer service”, “personalized customer support”, “personalized customer experience”, “customer support insights”, “customer service personalization”, “customer support personalization”, “customer experience personalization”
    
Kustomer

3 Proven Ways Technology Drives Business Results: Patient Motivation, Retention, Clinical Efficiency

Published By: Kindred Hospital Rehabilitation Services     Published Date: Aug 26, 2019
Research has demonstrated enhanced technology can improve communication between patients, families and care providers, improve motivation, and has the potential to effect better outcomes and higher levels of patient satisfaction. Additionally, better technology also makes the workplace more appealing to employees. With the investment and complexity involved, how can health systems utilize technology in the most efficient and effective ways to drive business results?
Tags : 
    
Kindred Hospital Rehabilitation Services

PAM Buyer's Guide

Published By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYER’S GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.
Tags : 
    
BeyondTrust

Protecting your brand and revenue from fraud rings & ATO attacks

Published By: Riskified     Published Date: Oct 11, 2019
See how fraud rings outsmart fraud management systems and learn how to stop them.
Tags : 
    
Riskified

Your Complete Guide to Modern EPM

Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle

Is Noise Pollution Making Your Data Less Secure?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Verifying Digital Identities Beyond One Time Passwords

Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Map-based Lane Keeping with HERE HD Live Map

Published By: HERE Technologies     Published Date: Sep 26, 2019
There are many challenging tasks when developing autonomous driving features to cope with the various changes to the environment. Often lane markings are faded or are covered with snow or dirt and can be difficult for a camera-based detection system. In this report, VSI addresses the application of HD map assets to improve the safety and performance of automated vehicle features within the context of lane keeping and trajectories. VSI has been examining applications of HD maps in our test vehicle. In a previous report, we discussed map-based Adaptive Cruise Control (ACC) using the advised speed attributes from HERE’s HD map data. In this report, we apply HERE’s HD map data to a lane keeping application and examine performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach.
Tags : 
    
HERE Technologies

6 Ways to Make Your Security Stack Work Harder

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA

Malicious Cryptominers are Eying Your Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA

Miners in the Shadows: Extracting Treasure with Stolen Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA

Should You Build or Buy Your Billing System?

Published By: BillingPlatform     Published Date: Jul 30, 2019
Explore Every Option Before Choosing Your Monetization Strategy When it comes to replacing your billing system or choosing a new billing solution to support revenue management, one of the difficult questions you will face is whether to build a custom software set or purchase a solution from a vendor. There are a variety of factors to consider when making the build vs. buy decision. This whitepaper helps you determine the right path for your organization. Download the full whitepaper to discover a practical approach to weighing your options for billing solutions. The whitepaper covers the following topics: • Question to answer before implementing a billing system • Considerations for building a billing system • Costs of building your own system • Considerations for buying a billing system • Common billing system requirements to consider By reading our systematic exploration of billing options and considerations, you will find the approach that will lend the greatest success to y
Tags : 
    
BillingPlatform

Forrester Research on DevOps Quality Metrics that Matter

Published By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
    
Tricentis

Intelligent Fraud Management – Banking and Insurance - Webinar

Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software

AA Ireland Transforms Itself and Insures Predictable Success

Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software

First Citizens Bank Turns to TIBCO Integration to Increase Deployment Speed and Win Awards

Published By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
    
TIBCO Software

Fraud Investigation Management - Webinar

Published By: TIBCO Software     Published Date: Aug 02, 2019
Fraud is one of the biggest overheads for most financial firms. Detecting crime is hard as fraud constantly evolves and the tools have to be able to evolve with it. Also one of the key areas of focus for most firms is to address the cost of handling the false positives that all automated systems generate. Watch this short demonstration to learn how TIBCO’s advanced analytics and data science solutions can help you overcome these challenges.
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.