apo

Results 1 - 25 of 174Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our 2018 Annual Cybersecurity Report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months. Report Includes: * The evolution of malware, including the developments behind network-based ransomware * Tactics adversaries are using to evade detection, namely, weaponizing cloud services and other technology used for legitimate purposes * Developments in malicious encrypted web traffic * Updates on how DDoS “Burst attacks” are increasing in complexity, frequency, and duration * Recommendations for defenders
Tags : 
     Cisco Umbrella EMEA
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
Organizations constantly struggle between embracing technological changes to open up new business opportunities and protecting the business from new challenges and risks. In this paper, we’ll examine containerization and how the adoption of this technology in F5 products affects IT professionals, architects, and business decision makers.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
"The practices of continuous integration, continuous delivery, and continuous deployment offer the promise of safer, faster, and more efficient software development. Critical to realizing this promise is the integration of application delivery and security services into the development and deployment workflows. F5 offers the platform, the integration, and the training to insert industry-leading application protection and optimization services into workflows so that software can be built, tested, and deployed with the services it needs to be secure, fast, and available. Download the solution guide to get all the details. "
Tags : 
     F5 Networks Singapore Pte Ltd
By: Menlo Security     Published Date: Nov 11, 2019
"Internet Isolation Provides 100% Protection from Web-based Attacks without Changing the Native User Experience. The breach of 1.5 million patient records—including patient data for the prime minister—at SingHealth, Singapore’s largest group of healthcare institutions, has been called the most serious breach of personal data in the nation’s history. The breach was of great concern and created a chill of fear in many public and private organizations throughout the region and the world. If Singapore, one of the world’s most connected countries, as well as one of the world’s most cybersecure, could have a breach of this magnitude perpetrated against a national institution, why couldn’t this happen to any organization, anywhere? In This White Paper We Will Discuss: - What is the network separation concept? - Who uses network separation? - What is Isolation and how it can separation networks?"
Tags : 
     Menlo Security
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: AWS     Published Date: Nov 04, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
     AWS
By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
     AWS
By: AWS     Published Date: Oct 01, 2019
Informatica is a leader in Enterprise Cloud Data Management, providing solutions that help organizations optimize, transform, and analyze their data. Informatica’s Intelligent Data Platform is built on a microservices architecture, helping organizations ensure their data is trusted, secure, governed, accessible, timely, relevant, and actionable on-premises or on the cloud.
Tags : 
     AWS
By: SAP Concur     Published Date: Sep 25, 2019
"Digital trends have impacted almost every aspect of today’s business world, from operational performance to customer service satisfaction. The payments department – the cash flow and working capital lifeline for an organisation – is no exception. Yet in Singapore and Malaysia, many organisations still have limited automation of the accounts payable (AP) process, or a heavy reliance on manual paper work. This report analyses the current AP landscape in Singapore and Malaysia, through surveys and interviews of 100 organisations in each country, across various industries. Download this Deloitte study to understand why automation is the top initiative for organisations today. "
Tags : 
     SAP Concur
By: AWS     Published Date: Sep 23, 2019
Un cambio rápido está en marcha en el mundo del gobierno digital. Este cambio no solo está siendo impulsado por los avances de la tecnología, sino también por una comunidad unificada por nuevas formas de pensar, ideas audaces y soluciones costeables y escalables. En apoyo a esta nueva y brillante era de innovación, Amazon Web Services (AWS) está ayudando a dar vida a estas visiones. Desde proyectos que impulsan el turismo a través de datos, hasta asegurar que los pronósticos meteorológicos siempre sean accesibles; pasando por encontrar nuevos hogares para huérfanos refugiados, hasta asegurar que los resultados electorales no saturen sitios web, y mucho más. Al beneficiarnos de las regiones de AWS, estamos ayudando a muchos de los pensadores, creadores y constructores más ambiciosos del sector público a hacer realidad sus ideas. Para innovar. Para inspirar a otros. Y para seguir construyendo. Descubra hoy el futuro del gobierno digital en la nube.
Tags : 
     AWS
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
     F5 Networks Singapore Pte Ltd
By: TIBCO Software     Published Date: Sep 16, 2019
A maneira que abastecemos nossos veículos, aquecemos nossas casas e impulsionamos nossas indústrias está mudando radicalmente. As tecnologias que vêm sendo implementadas em larga escala mas que se mostram ineficientes, como carros com motores de combustão interna e boilers a gás, estão sendo substituídas por alternativas elétricas e de maior eficiência. E fontes renováveis, como as energias solar, eólica e térmica, entre outras, apoiadas por baterias de última geração, estão atendendo uma porcentagem cada vez maior da demanda de energia. Este relatório aborda como o provedor líder de infraestrutura de tecnologias da informação, TIBCO, está impulsionando a transformação digital ao permitir que sejam tomadas decisões melhores e ações mais rápidas e inteligentes através do TIBCO® Connected Intelligence Cloud. Os exemplos abaixo mostram como a tecnologia da TIBCO está ajudando as empresas da indústria de energia: • Interconecte tudo, desde APIs e sistemas a dispositivos e pessoas • Captur
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo estão apostando muito em inteligência artificial e machine learning para lhes dar a vantagem tecnológica necessária para obter serviços bancários em tempo real, personalizados e preditivos. Um marco ajudará a diferenciar os primeiros ganhadores e fornecerá vantagens contínuas em inteligência. Faça o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo estão se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que você conhecerá: • 8 tendências que refletem o nível de preparação do banco para a inteligência conectada • 9 armadilhas para evitar e 9 maneiras de pular os obstáculos • Os elementos básicos pessoais, preditivos e em tempo real da IA e ML para os bancos • Líderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso • Orientação essencial do IDC para os bancos líderes
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
A tendência atual na indústria de manufatura se inclina para os produtos feitos sob medida em lotes pequenos e com tempo de entrega reduzido. Com frequência, esta mudança pode alterar a produção, o que acarreta em um maior tempo de inatividade das máquinas, custos de produção mais altos, desperdício de produtos e a necessidade de voltar a produzir os produtos defeituosos. Para satisfazer a demanda dos clientes por trás dessa tendência, os fabricantes devem passar rapidamente para novos modelos de produção. O controle de qualidade é a principal área que a TI deve apoiar. Ao mesmo tempo, a rastreabilidade dos produtos se torna essencial para a conformidade, bem como para a qualidade. A rastreabilidade pode ser alcançada interconectando fontes de dados em toda a fábrica, analisando dados históricos e de streaming para obter insights e tomando medidas imediatas para controlar todo o processo de ponta a ponta. Isso pode levar a notáveis reduções de custo e ganhos de eficiência, confiabili
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
La manera en que ponemos en marcha nuestros vehículos, calentamos nuestros hogares e impulsamos nuestras industrias está cambiando de manera radical. Las tecnologías que se han implementado a gran escala pero que resultan ser ineficientes, como los automóviles que utilizan motores de combustión interna, están siendo reemplazadas con alternativas electrificadas y más efectivas. Y las energías renovables como la solar, la eólica y la térmica, entre otras, apoyadas por el almacenamiento en baterías de próxima generación, están atendiendo un porcentaje cada vez mayor de la demanda de energía. Este reporte aborda cómo el proveedor líder de infraestructura de tecnologías de la información, TIBCO, está impulsando la transformación digital al permitir tomar mejores decisiones y realizar acciones más veloces e inteligentes a través de TIBCO® Connected Intelligence Cloud. Los siguientes ejemplos muestran cómo la tecnología de TIBCO está ayudando a las empresas de la industria energética:
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo están apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnológica que necesitan para ofrecer servicios bancarios más personalizados, predictivos y en tiempo real. Un marco ayudará a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitirá conocer cómo los mejores bancos del mundo se están volviendo más personales, más predictivos, y más en tiempo real que nunca. Lo que usted conocerá: • Las ocho tendencias que reflejan el nivel de preparación de los bancos para la inteligencia conectada • Los nueve obstáculos que evitar y las nueve formas de salvar las brechas • Los elementos básicos personales, predictivos y de tiempo real de la IA y el ML para los bancos • Los líderes destacados de acuerdo con la investigación de IDC Financial Insights y sus respectivos casos de uso • Una guía esencial de IDC para los bancos líderes
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
Servicios Financieros es una industria en la que la innovación siempre está presente. Los modelos de negocio transformadores como las casas de bolsa de bajo costo, los productos de inversión innovadores como los fondos de inversión cotizados, y las regulaciones estrictas como Gramm-Leach-Bliley son algunos ejemplos. Otros ejemplos incluyen: • Las nuevas firmas fintech, como la reciente inversión de nueve mil millones de dólares hecha en Ant Financial Services Group, y un sinnúmero de otras empresas emergentes similares apoyadas con capital de riesgo, están apuntando a segmentos bien establecidos de la industria de servicios financieros. • Servicios de gestores automatizados potenciados por la inteligencia artificial y el machine learning que apoyan a los asesores financieros y a los gestores de carteras • Las regulaciones y las leyes para el manejo de riesgos que cambian constantemente, como GDPR, Basilea III y Open Banking, y que transforman la manera en que se interactúa con los
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
La tendencia actual en la industria de manufactura se inclina hacia los productos hechos a la medida en lotes más pequeños y con tiempos de entrega más reducidos. Con frecuencia, este cambio puede alterar la producción, lo que se deriva en un mayor tiempo de inactividad de las máquinas, costos de producción más altos, desperdicio de productos, y la necesidad de volver a producir los productos defectuosos. A fin de satisfacer la demanda de los clientes detrás de esta tendencia, los fabricantes deben cambiar rápidamente a nuevos modelos de producción. El control de calidad es el área clave que TI debe apoyar. Al mismo tiempo, el trazabilidad de los productos se vuelve vital para el cumplimiento, al igual que la calidad. La trazabilidad puede lograrse al interconectar fuentes de datos dentro de la fábrica, analizando los datos históricos para obtener conocimientos y actuar de inmediato para controlar el proceso en su totalidad. Lograrlo puede llevar a reducciones de costos importantes,
Tags : 
     TIBCO Software
By: FICO EMEA     Published Date: Sep 12, 2019
La implantación de sistemas de pago en tiempo real ha supuesto ventajas tanto para las personas y las empresas como para los delincuentes. Los países que ya han adoptado sistemas de transacciones en tiempo real han experimentado un aumento del fraude, incluido el fraude APP -Authorised Push Payment- y el fraude por apropiación indebida -Account Takeover-, así como un aumento del blanqueo de dinero, en particular el uso de cuentas de mula. Este whitepaper analiza el impacto que las transacciones en tiempo real tienen sobre el fraude y examina los cambios en las estrategias Antifraude aportando soluciones para mantenerlo bajo control, incluyendo: - La necesidad de evaluar las transacciones en tiempo real para detectar fraude - Cómo proteger a los clientes de los fraudes en las transacciones push -El papel del Machine Learning en las estrategias Antifraude.
Tags : transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
     FICO EMEA
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com