apo

Results 51 - 75 of 134Sort Results By: Published Date | Title | Company Name
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
This paper focuses on analyzing Singapore's new prime areas - Marina Bay and Sentosa Cove - as well as the emerging prime areas - Ophir-Rocher Beach Road Tanjong Pagar and Keppel Bay - against the traditional prime districts. The growing response of homebuyers and investors to the residential properties in new and emerging prime areas has helped to establish price levels that are similar to the traditional prime districts. It is a new dawn of the horizon for the nation, as changes to the urban fabric of the city state will continue to challenge preconceived idea of prime districts. Download this whitepaper to learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: SailPoint Technologies     Published Date: Mar 25, 2019
Digital transformation requires news ways to ensure cybersecurity and compliance. Find out why top senior technology executives call identity governance the great enabler.
Tags : 
cyberattacks, cybersecurity
    
SailPoint Technologies
Published By: Epicor     Published Date: Oct 07, 2009
Pressures to reduce costs continue to outweigh all other business drivers impacting Enterprise Resource Planning (ERP) in 2009. ERP has become more than a necessary infrastructure; it is also a strategic weapon in streamlining and accelerating business processes - while providing visibility to those processes throughout the enterprise.
Tags : 
erp, enterprise resource planning, enterprise applications, integrated suite, roi, tco, inventory reduction, sap, oracle, manufacturing, crm, visibility
    
Epicor
Published By: FICO     Published Date: Sep 12, 2017
PSD2 aims to tackle payments fraud and Strong Customer Authentication is the weapon of choice. Unfortunately, Strong Customer Authentication has a downside, it increases the burden on customers who must prove they are the legitimate account holder more often.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Apr 26, 2019
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
    
Motorola Solutions
Published By: Uberall     Published Date: Jan 24, 2019
Despite the headlines, retail isn’t headed for an apocalypse. But it is changing. A lot. Mobile commerce isn’t a beast that is going to drive your customers out of business, but how can you reassure them of that? Here are a few statistics to help channel partners paint the picture for your clients, and help them keep up with the latest changes in retail shopping!
Tags : 
    
Uberall
Published By: Coupa Software     Published Date: Sep 19, 2012
Don't let manual processes slow down your company's cash flow. Download this white paper now to find out how you can bring financial performance up to speed with web-based purchasing software.
Tags : 
purchasing software, purchasing process, receiving process, web-based software, procurement, web-based purchasing
    
Coupa Software
Published By: Compass Datacenters     Published Date: Jul 07, 2015
A high percentage of today’s data centers use water-based cooling methods. Although evaporative cooling, whether through traditional towers or “advanced” adiabatic cooling systems (aka swamp coolers), remain highly effective cooling methods, when you’re planning a new data center you may want to consider the impact of the weather and water availability on your decision.
Tags : 
echnology, water, evaporative cooling, swamp coolers, data center maintenance
    
Compass Datacenters
Published By: Adobe     Published Date: Jul 28, 2015
Download the new report from Adobe to learn how this design advantage can be your company’s new secret weapon.
Tags : 
adobe creative cloud, design, customer experience, content, brand experience, personalization
    
Adobe
Published By: Dropbox for Business     Published Date: Aug 27, 2014
In this webinar, Mobify Solutions Engineer Kyle Young and Dropbox Solutions Architect Rajan Kapoor will discuss how organizations large and small are embracing mobile work, to their advantage. They will also outline five strategies you can use today to make sure employees have the flexibility they need.
Tags : 
productivity, dropbox, mobile work, mobile trends, best practices
    
Dropbox for Business
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility
    
LogRhythm
Published By: FICO     Published Date: Mar 02, 2018
The role of analytics in managing, improving and ultimately transforming supply chains cannot be understated. But what about the analytics themselves? FICO’s Zahir Balaporia and renowned author Tom Davenport use the term “The Analytics Supply Chain” to reflect that the actual analytics themselves parallel supply chains, with inherent challenges and problems if things “get stuck.” Rethinking analytics in these terms can not only improve supply chain performance, but also any other business problems you seek to solve. This article targets: · Steps in the analytics supply chain and the vital role of data and analytic models · How your predictions, recommendations and insights need to rely on similar attributes to finished manufactured products; · Key questions to ask yourself in determining where you need to fix your analytics supply chain.
Tags : 
supply, chain, analytics, employee, optimization, organisations, productivity
    
FICO
Published By: Kronos     Published Date: Jul 26, 2017
The use of manual, outdated payroll processes can result in paycheck problems that weaken employee engagement and potentially cause them to quit. Smooth payroll operations support employee engagement initiatives and allow payroll staff to focus on higher-level business goals.
Tags : 
payroll operations, employee engagement, human resources, business efficiency
    
Kronos
Published By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : 
anaplan, architecture, security, controls, geographically, regional, global
    
Anaplan
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.
Tags : 
ssl visibility, passive inspection architecture
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : 
tls 1.3
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.
Tags : 
ssl visibility, passive inspection architecture
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : 
tls 1.3
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd
Start   Previous    1 2 3 4 5 6    Next    End
Search