online security

Results 1 - 25 of 175Sort Results By: Published Date | Title | Company Name

Remove the Language Barriers that Stifle Global Corporate Collaboration Securely eBook

Published By: SDL     Published Date: Nov 12, 2019
Communication is Easy - or is it? Collaboration across global teams is essential to the success of multinational organizations, but ensuring everyone understands each other can be challenging. Online translation sites can pose security risks, especially for sensitive internal information, so how can corporations make it easier for teams to understand each other? Learn how overcoming the barriers to corporate collaboration produces valuable dividends: Communication in a person's native language minimizes misunderstandings and improves employee satisfaction. Protection from exposing sensitive company information through the use of unsecure, instant self-service translation portals. Bring a global perspective to your organization's decision making despite the language barrier.
Tags : 
    
SDL

Security vs. convenience in the payment experience

Published By: GoCardless     Published Date: Oct 08, 2019
With Strong Customer Authentication (SCA) coming into force on 14 September 2019 as the final part of PSD2, many online businesses are required to add additional security measures to large parts of their online payment experience. Key goals of SCA include reducing payment fraud and creating a safer payment experience for the customer.
Tags : 
    
GoCardless

Gartner Market Guide for Online Fraud Detection

Published By: Sift     Published Date: Aug 29, 2019
As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach
Tags : 
    
Sift

2019 Experian Identity and Fraud report

Published By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian

451 Research: Public Cloud Payments Imperative

Published By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : 
payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
    
Stripe

Gartner Market Guide for Online Fraud Detection

Published By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
    
Sift

Threat prevention with visibility - 50% gain in security team’s productivity

Published By: Gigamon     Published Date: Jun 21, 2019
An online threat prevention strategy should be more than a collection of security tools. It needs to be an integrated and intelligent approach. A complete threat prevention solution not only enhances the performance of prevention tools, but it also increases the efficiency of operations teams by enabling them to quickly deploy patches and implement new technology without impacting network performance or relying on maintenance windows. Read this solution brief in local language to learn how you can gain 50% in team productivity.
Tags : 
    
Gigamon

The Impact of SCA: Shaking up Europe's Online Economy

Published By: Stripe     Published Date: Jun 11, 2019
Analyst firm 451 Research interviewed 500 businesses and 1,000 consumers and found that Europe's online economy risks losing €57 billion when Strong Customer Authentication (SCA) goes into effect on 14 September. SCA is intended to reduce fraud rates and enhance the overall security of online payments. But what does this mean for businesses and how can they best accommodate these new requirements in order to limit the financial impact? Download the report to find out.
Tags : 
sca, online economy, online payment
    
Stripe

Challenger migrates to AWS with Rackspace to provide cloud and local market expertise

Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace

From the Core to the Edge: 7 Reasons You Need Security at the Edge

Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies

Why It Pays to Use Electronic Signature

Published By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK

How Snapper Further Protects Data in Amazon S3 Using CWP for Storage

Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS

How Snapper Further Protects Data in Amazon S3 Using CWP for Storage

Published By: AWS     Published Date: Oct 30, 2018
Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
data, amazon, cwp, storage
    
AWS

The PCI Compliance Guide For Ecommerce

Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce

E-Book: Advancing Digital Maturity in Financial Services

Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies

E-Book: Advancing Digital Maturity in Financial Services

Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies

E-book: Competitive Edge in the Cloud

Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency" "Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery plat
Tags : 
    
Akamai Technologies

E-Book: Advancing Digital Maturity in Financial Services

Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies

E-Book: Advancing Digital Maturity in Financial Services

Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies

2018 Voice Intelligence Report

Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security

Real-time Business actions

Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA

INSIDER THREAT 2018 REPORT

Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies

Report: Sponsored Report: 2018 Insider Threats Report

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA

The Complete Guide to Performance Testing Your Retail Websites and Apps

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies

The Complete Guide to Performance Testing Your Retail Websites and Apps

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.