stats

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Inforgraphic Includes fast facts such as: Average Attack Size
Tags : 
ddos, stats, trends, attacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Artemis Health     Published Date: Feb 05, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
    
Artemis Health
Published By: Background Direct     Published Date: Feb 16, 2015
Know who you are hiring with these important background check stats and tips from Background Direct™.
Tags : 
background checks, background direct, retention rates, employment screening, brand reputation, employment verification, first advantage
    
Background Direct
Published By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
    
BMC ASEAN
Published By: Brightidea     Published Date: Feb 05, 2016
What’s in the eBook? Get this ebook The Secrets To A Successful Innovation Program to find insights from over 100 Brightidea customers and exceptional innovators, including heavyweights BT Group, Cisco, GE, Motorola and more, sharing responses to key questions most enterprises ask – and stats that back up the narrative, like: -Humana experiencing $6.2 million in cost savings from a single innovation challenge campaign. - More than 75% of Nielsen’s innovation challenges resulting in an idea that was implemented. - 95% of Global 500 companies saw improvement in their innovation program. Take a look by filling out the form to download the eBook – and then reach out and let us know if you’d like to be the next success story!
Tags : 
    
Brightidea
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Colleges and universities are under cyber siege. In a recent attack, more than 2,500 student, alumni, and staff accounts were compromised at the University of Buffalo. This brief will teach you how to help prevent a data breach on your own campus.
Tags : 
    
Canon Solutions America
Published By: Citrix     Published Date: Jun 03, 2015
This white paper analysed data from hundreds of their webinars – plus surveyed 250 webinar attendees – to help them put together these handy webinar stats.
Tags : 
webinars, webinar stats you should know, webinar stats, communication, customer interaction service, customer relationship management, customer satisfaction, video conferencing
    
Citrix
Published By: Cornerstone OnDemand     Published Date: Jul 09, 2019
Can you imagine having to convince company leadership to increase revenue? Well, that’s exactly what learning and HR leaders are having to do when it comes to investing in learning. Leadership just isn’t aware of the numbers that prove the business impact of learning on your company’s bottom line. Let Cornerstone help you build the case. Download of latest brief, “The business impact of learning”, and we’ll provide you with the stats and information you need to show why learning matters, why your company needs it, and what learning can do for your bottom line.
Tags : 
    
Cornerstone OnDemand
Published By: DocuSign     Published Date: Apr 24, 2018
"We live in a world where the ability to do business digitally is a given. Now more than ever, people want to do business with organizations via the ease, speed, convenience and security of a fully digital experience. Yet many businesses are failing to keep pace in their front office with customer expectations, as well as with competitors that have made digital transformation a priority. Download this eBook to learn how B2B companies can evolve to meet customer expectations by adopting a fully digital experience with eSignatures. Some quick stats: - 87% of U.S. workers expect to be able to sign and purchase digitally - 75% of U.S. workers think that eSignatures are more secure than paper methods "
Tags : 
    
DocuSign
Published By: Dyn     Published Date: Oct 04, 2016
With nearly 80% of businesses experiencing four or more disruptions to their site each month, Aberdeen Group recently conducted a study to get to the root of today's internet performance challenges. Read the findings and discover how companies: Improve resolution times resulting from web outages - 65% of companies experience an hour or more to repair an internet related outage Increase customer satisfaction by 30% - A consistent, reliable and fast web experience is your key to happy, loyal customers Protect revenue - 60% of businesses record a minute of downtime resulting in a $1,000 loss in revenue Are your online services and sites built for resiliency or destined for the headlines? Get the report to find out how leading organizations are bucking the stats and implementing Internet Performance Management (IPM ) tools to boost time to resolution and improve site performance.
Tags : 
performance management, website, internet, dns, web service management
    
Dyn
Published By: First Advantage     Published Date: Apr 30, 2018
Know who you are hiring with these important background check stats and tips from First Advantage. Why background checks are necessary? Running a background check on a future employee is not only a smart idea, but can help protect your: reputation, customers & employees, business.
Tags : 
    
First Advantage
Published By: IBM     Published Date: Oct 17, 2016
See how you can turn data into actionable insights with predictive analytics. Take our brief assessment to learn which analytical capabilities will enable you to find the greatest value in your data and make confident, accurate business decisions.
Tags : 
ibm, analytics, spss, stats, modeler, predictive analytics, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately. Join IBM's open source community and instantly boost your predictive analytics.
Tags : 
ibm, analytics, open source, spss, stats, modeler, predictive analytics, enterprise applications
    
IBM
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®
Published By: Localytics     Published Date: Jul 18, 2014
In this 23-page eBook, written for people new to app analytics, you'll learn what you need to know to start improving your app.
Tags : 
app analytics, mobile analytics, app analytics tools, app analytics guide, app monetization, user value, user acquisition, user conversion, track users, app funnel, app tracking, app testing, app measurement, app performance, app optimization, android app analytics, ios app analytics, iphone app analytics, app stats, app data
    
Localytics
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.