company

Results 151 - 175 of 2654Sort Results By: Published Date | Title | Company Name
Published By: Darktrace     Published Date: Jun 17, 2019
H&M manages nearly two million containers every year and provides a range of services — including steamship lines, intermodal trucking, and warehousing — to facilitate effective supply chain management. The company’s attack surface was rapidly expanding as its scope of operations widened, and, having positioned itself as an early champion of increased integration in the industry, it placed paramount importance on adopting a proactive approach to cyber security.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Published By: AppZen     Published Date: Jun 17, 2019
Setting clear expectations and guidelines around travel and entertainment expenses (T&E) is crucial to establishing a healthy company culture. Employees want to feel at ease laying out money for the company, feeling confident they will get reimbursed quickly. Crafting a comprehensive T&E policy and making sure it’s available to all employees is an important first step, but a policy alone isn’t enough — a culture of anxiety and mistrust can emerge from even the most carefully constructed policies.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
    
AppZen
Published By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
    
PwC
Published By: Workplace by Facebook     Published Date: Jun 13, 2019
Valet Living is an amenity services company that supports the multifamily housing industry in over 40 states across the US. From in-home services such as cleaning, package delivery, laundry and pet care, to maintenance and grounds keeping work around apartment communities, Valet Living aims to raise the bar on residential concierge services.
Tags : 
    
Workplace by Facebook
Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC
Published By: Google Apigee APAC     Published Date: Jun 10, 2019
How Six Companies Innovate with API Management Companies are hungry for ways to innovate in the digital age, and as enterprises have experimented with new technologies, it’s become clear that success requires expanding the reach of digital assets beyond a business’s internal talent. The connected experiences that customers demand occur across a range of channels, and the people building those experiences can be a developer building a mobile app in her garage just as easily as an IT engineer. Businesses need to make their digital assets leverageable to more developers so they can build more digital experiences across more channels, scalably and securely, to engage more customers. In this brief, we explore the diverse ways that innovation leaders have leveraged APIs to transform the way their companies do business. Download this brief to learn more about how to use the power of APIs to open new business channels for your company.
Tags : 
    
Google Apigee APAC
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Forcepoint     Published Date: Jun 06, 2019
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: VMware     Published Date: Jun 04, 2019
How can a software-defined data center help your company gain a bigger competitive advantage? To help your business stay competitive, your IT organization needs a modern data center that can provide the agility, security, and scalability required to drive innovation and growth in the digital era. Get suggestions and tips for modernizing your data center in this For Dummies guide.
Tags : 
    
VMware
Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology consulting company had 3-6 days Average TAT to resolve the tickets thereby having poor customer experience. LTI’s AI Solution helped in implementing Virtual Assistant Chatbot which was very well integrated with backend systems and enterprise systems to solve the challenges. Benefits i. 30% activities moved to Virtual Bots ii. L1 Support available “Always On” Model Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
Liberty Mutual Insurance offers personal and commercial insurance to policyholders around the world. With more than 50,000 employees located in more than 60 countries, managing the corporate benefits program is a tremendous task. Matthew Vlieger, Manager of Finance and Analytics in the company’s Corporate Benefits Division, is responsible for analyzing member engagement within the various health plan offerings. He also provides insights to the strategy directors to help them identify areas for improvement.
Tags : 
    
Group M_IBM Q2'19
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
IT transformation is more than a one-time migration of applications to the cloud, because the cloud isn’t a destination in itself. Successful migration is the start of an ongoing process of evolving your applications to take advantage of new native capabilities, as they become available on your chosen cloud platform. This e-book illustrates the iterative process of cloud adoption by following the IT transformation journey of a fictitious company, Mercurial Footwear, in its adoption of Microsoft Azure Infrastructure-as-a-Service (IaaS). The various stages of this transformation — from a simple lift-and-shift to the cloud to leveraging cutting-edge technologies like containers and serverless computing — are typical of the process that Rackspace helps its customers to navigate through. With step-by-step explanations, the e-book will provide you with insights into the way cloud architecture evolves, to help you to better take advantage of the Platform-as-a-Service (PaaS) features most re
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Today, it isn’t a matter of if you’re taking SAP to the cloud – but a matter of when, and how you’re going to make it happen. Because by moving your SAP workloads to the cloud, you are putting them together with other data streams, advanced analytics and machine learning, to create a powerful combination to better engage customers, empower employees, optimize operations and transform products. This e-book introduces Rackspace as the managed cloud service provider to partner, for moving SAP workloads to Azure. Being certified in all the leading SAP technologies, including hosting services, HANA Operations and HANA Enterprise Cloud (HEC) – and having been awarded Microsoft Hosting Partner of the Year five times – Rackspace has got the whole SAP on Azure solution covered, from planning to deployment and ongoing management. Check out the case studies of global companies, like Rockwell Automation, The Mosaic Company, Malaysia Airlines and Coats & Clark, to discover how they have benefi
Tags : 
    
Rackspace
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Domino Data Lab     Published Date: May 23, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.