hie

Results 1 - 25 of 2364Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Wat is netwerkbeveiliging? Netwerkbeveiliging omvat elke activiteit die is bedoeld om de bruikbaarheid en integriteit van uw netwerk en gegevens te beschermen. Dit betreft zowel hardware- als softwaretechnologieën. Met effectieve netwerkbeveiliging wordt de toegang tot het netwerk beheerd. Hierbij worden diverse bedreigingen gestopt zodat deze zich niet verder kunnen verspreiden op uw netwerk en hackers geen toegang krijgen.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Sep 27, 2019
The StackWise-480 architecture allows stacking of up to eight switches in a ring topology to achieve 480G of stack bandwidth. The latest Cisco Catalyst 9300 Series Switches support StackWise-480. This technology is flexible, modular, and evolutionary, and it delivers Cisco IOS XE feature capabilities with hardware acceleration to every port in the stack.
Tags : 
    
Cisco
Published By: VMware     Published Date: Sep 12, 2019
Over the next few years, chief information officers (CIOs) will preside over a maelstrom of change that will fundamentally alter the way their companies do business in the future.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
IT process automation can seem like a big step, but there are incremental ways to achieve improved efficiency that reduce risk and drive better business outcomes. The proper approach to automation can turbocharge your administrative teams, open new doors and provide the agility to respond to any business need. It’s the key to unlocking the power of cloud, and new service offerings make it more attractive to those looking to build the right IT business strategy for the future.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: Kindred Hospital Rehabilitation Services     Published Date: Jul 10, 2019
Rehab programs will experience a major infux of medically complex patients, including those with neurological conditions, in the coming decades. The drastic increase is being spurred by an aging population. For instance, stroke prevalence is expected to rise by 21% by 2030, and more than 1.2 million citizens are projected to have Parkinson’s disease. This leaves rehab leaders with one signifcant question: What can be done to prepare for the increase of medically complex patients? By evolving to meet the needs of this changing population, rehab programs can successfully meet the challenge, providing patients with the highest level of care while achieving greater performance standards. In this whitepaper, we’ll examine the three areas that drive the greatest impact on treating medically complex patients: • Clinical staff • Tech innovation • Patient and family member experience
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Jeppesen     Published Date: Oct 01, 2019
Airlines are putting a serious dent in their operating budgets by using technology solutions to save on crew costs—up to 15% each year. Download this infographic to learn more.
Tags : 
    
Jeppesen
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
    
Pure Storage
Published By: Gigamon     Published Date: Sep 03, 2019
Banking institutions worldwide are expanding their digital capabilities to meet evolving customer expectations and keep pace with new digital banking trends. As financial services firms increasingly embrace a multicloud strategy to achieve greater agility and cost savings, pervasive visibility across data centres and cloud environments is paramount to meet evolving security and compliance requirements.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: KPMG     Published Date: Jun 06, 2019
High-volume administrative tasks are a feature of every business. We helped a global bank develop a machine learning algorithm to help with the task of reviewing over 100,000 ‘sanctions alerts’ every day. Read this story to find out: • what other benefits AI can deliver beyond cost savings • how AI tools achieve greater accuracy than human reviewers • what it takes to apply AI and Machine Learning successfully in a regulated sector.
Tags : 
    
KPMG
Published By: Nextgen     Published Date: Sep 25, 2019
Your practice can save time and money by delivering on patient expectations. You can better keep up with regulatory demands and reporting requirements—and avoid unsatisfied and unresponsive patients—when you employ best practices that address patient needs. In this eBook, you’ll learn strategies to avoid missed revenue and save staff effort by using smart efficiency improvements, such as checking insurance information up front. You’ll also learn how you can get back to caring for patients, not chasing payments—and the secret to achieving strong financial outcomes. Finally, you’ll discover how you can get paid quickly, easily, and fully—all while addressing your patient demands for an improved, more efficient experience.
Tags : 
    
Nextgen
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrella as the first line of defense against threats on the internet. He shares best practices and the outcomes his team has seen using DNS-layer security to protect users wherever they access the internet. View this video to hear security best practices and lessons learned from Alan, a security veteran.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Jeppesen     Published Date: Oct 08, 2019
Airlines are putting a serious dent in their operating budgets by using technology solutions to save on fuel costs—up to 4% each year. Download this infographic to learn more.
Tags : 
    
Jeppesen
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: Excellus BlueCross BlueShield     Published Date: Jul 25, 2019
Each year it seems pharmacy costs are taking a larger bite out of businesses like yours. We’re here to relieve some of the burden and help you reach your business goals by putting the sound advice you need right at your fingertips.
Tags : 
pharmacy costs, health care costs, chronic health conditions, prescription costs, pharmacy benefits, medical and pharmacy integration, pharmacy benefits managers, pharmacy claims, drug benefits, pharmacy benefits management
    
Excellus BlueCross BlueShield
Published By: Excellus BlueCross BlueShield     Published Date: Sep 20, 2019
Oral health can have a big impact on your bottom line. Learn how to take care of your employees and your company. Each year, 164 million hours of work are lost in the U.S. to dental disease.1 So it’s clear that helping employees with their oral health can have a big impact on your team’s productivity. Combining your medical and dental benefits with Excellus BlueCross BlueShield can help catch small problems early to keep costs in check – and it’s more affordable than you might think. Find out more by downloading a free infographic from Excellus BlueCross Blue Shield, and get more resources covering a range of health-related topics at ExcellusforBusiness.com.
Tags : 
    
Excellus BlueCross BlueShield
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Global producer of polycrystalline silicon for semiconductors, Hemlock Semiconductor needed to accelerate process optimization and eliminate cost. With TIBCO® Connected Intelligence, Hemlock achieved centralized, self-service, governed analysis; revenue gains; cost savings; and more. Fueled by double-digit growth in the markets it serves, Hemlock Semiconductor is adapting to the increasing commoditization within the polysilicon industry and better positioning itself to compete. A key factor in this plan is to equip process-knowledgeable personnel with the skills and tools to accelerate delivery of process optimizations and associated cost elimination. Hemlock turned to a TIBCO® Connected Intelligence solution to address the challenges. By implementing TIBCO Spotfire® and TIBCO® Streaming analytics, TIBCO® Data Science, and TIBCO® Data Virtualization, the company created more self-service analytics. Adding TIBCO BusinessWorks™ integration let the company realize the vision of connect
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library