hi def

Results 151 - 175 of 1110Sort Results By: Published Date | Title | Company Name

Hyperconverged infrastructure: Reinvigorating the data centre for the cloud era

Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC

Hyperconverged infrastructure: Reinvigorating the data centre for the cloud era

Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC

Vulnerability Intelligence Report 2018

Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable

Manufacturing Intelligence for the Next Industrial Revolution (Whitepaper)

Published By: TIBCO Software GmbH     Published Date: Jan 22, 2019
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
    
TIBCO Software GmbH

On-Demand Webinar: Threats on the Inside

Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast

Advanced Root Cause Analysis for Product Quality Improvement using ML in TIBCO Spotfire

Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Gradient Boosting Machine (GBM) modeling is a powerful machine learning technique for advanced root cause analysis in manufacturing. It will uncover problems that would be missed by regression-based statistical modelling techniques and single tree methods, but can easily be used by analysts with no expertise in statistics and modelling to solve complex problems. It is an excellent choice for advanced equipment commonality analysis and will detect interactions between process factors (for example, machines, recipes, process dates) that are responsible for bad product. It can also be used to identify complex nonlinear relationships and interactions between product quality measurements (for example, yield, defects, field returns) and upstream measurements from the product, process, equipment, component, material, or environment.
Tags : 
    
TIBCO Software GmbH

Five Steps to Better People Analytics

Published By: Workday     Published Date: Jan 09, 2019
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
    
Workday

Top 5 reasons to deploy your business management solution to the cloud

Published By: Sage Software (APAC)     Published Date: Jan 07, 2019
Have you outgrown your accounting solution? 88% of spreadsheets have errors in them, while 50% of spreadsheets used by large companies have material defects. Today, 73% of organisations would consider a cloud ERP. Read our new whiteppaer, to find out they key benefits your company can achieve with a cloud business management solution.
Tags : 
    
Sage Software (APAC)

Webinar: Strengthen Your Email Security

Published By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast

Osterman Research: Why You Must Archive Business Content And What You Can Do With It

Published By: Mimecast     Published Date: Dec 20, 2018
The right solution for archiving electronic content provides the foundation supporting the conventional, defensive applications for data retention such as compliance and e-discovery; but also the proactive applications that enable competitive and other advantages. Sponsored by Mimecast, this paper from Osterman Research details how archiving trends and use cases are changing and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast

Cisco Regional Digital Network Architecture: Introducing a New era in Networking

Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco

Blockchain for Mobility Services

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
    
Group M_IBM Q119

The Barriers Between Finance and Analytics

Published By: Workday APAC     Published Date: Dec 18, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday APAC

Top 5 Reasons Why Hyperconverged Infrastructure is The Right Way Forward

Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is the best strategic option for meeting your organization’s demands for increased efficiency and agility while leveraging existing apps and data. HCI is a scale-out software-defined infrastructure that converges core data services on flash-accelerated, industry standard servers, delivering flexible and powerful building blocks under unified management. Put simply, HCI has the potential to revolutionise your security environment and increase efficiencies relating to application performance. In this whitepaper, we break down the top 5 reasons why hyperconverged infrastructure is the right way forward for your organisation. Please enter your details to access the whitepaper.
Tags : 
    
VMware

ADLINK and Touch Cloud deliver AI solutions powered by Intel® Vision Products

Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel

NexCOBOT Leverages Intel® Vision Accelerator Design Products to Deliver Robotics with AI

Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies

Magic Quadrant for WAN Edge Infrastructure

Published By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
    
Cisco

The Network Leaders’ Guide to Secure SD-WAN

Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA

Report: Shaping the workforce of the future

Published By: KPMG     Published Date: Dec 05, 2018
As extraordinary advances in technology start to transform the traditional workforce, business leaders must get ready for a future where skilled employees and smart machines will work together. Read this report to find out: what the emergence of AI means for leadership and workforce management how to define a strategic roadmap to understand how AI will impact your organisation how a new concept – ‘workforce shaping’ – is being used by leading organisations preparing for the future.
Tags : 
    
KPMG

Ransomware Defense For Dummies

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
    
Cisco Umbrella EMEA

30 Minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA

You’ve Been Breached – Now What? How to Respond to a Worst-Case Scenario

Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.