Consumer Web Portals: Platforms At Significant Security Risk

Forrester sees clear majorities of firms engaging in online consumer engagement in an identity-enabled way. In our Forrsights Security Survey, Q2 2013, 56% of IT security decision-makers reported that they either have implemented or plan to implement consumer identity theft/fraud management; 60% have implemented or plan to implement consumer IAM.

Spotlight

Prevoty

Prevoty provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing.

OTHER WHITEPAPERS
news image

Intelligent Networking, AI and Machine Learning

whitePaper | October 20, 2022

Telecoms need to be able to incorporate new technologies and next-generation connectivity such as 5G to customers and end users.

Read More
news image

Trustworthy Use of Artificial Intelligence in Finance: Regulatory Perspectives from Asia Pacific

whitePaper | October 20, 2022

The digital evolution of the financial services (FS) industry is heavily reliant on having quality information and analytics to deliver services to customers and manage operations in an efficient and risk-appropriate manner.

Read More
news image

Enabling Agility and Flexibility in Modern Application Development with MongoDB on Google Cloud

whitePaper | August 30, 2022

Traditional database management systems have become more essential than ever, as data volume, velocity, and variety all increase at breakneck speed. But the harsh truth is that legacy database management systems were never designed for a digital-first business climate shaped by such factors as cloud computing, pervasive mobility, microservices, new data sources, and cloud-native application development.

Read More
news image

The future of AI is hybrid

whitePaper | May 15, 2023

The future of AI is hybrid. As generative AI adoption grows at record-setting speeds1 and drives higher demand for compute,2 AI processing must be distributed between the cloud and devices for AI to scale and reach its full potential – just like traditional computing evolved from mainframes and thin clients to today’s mix of cloud and edge devices. A hybrid AI architecture distributes and coordinates AI workloads among cloud and edge devices, rather than processing in the cloud alone. The cloud and edge devices, such as smartphones, vehicles, PCs, and IoT devices, work together to deliver more powerful, efficient, and highly optimized AI.

Read More
news image

Artificial Intelligence at the Heart of Business 4.0

whitePaper | February 16, 2023

Artificial Intelligence (AI) is answer to challenges that telecoms must face in a time of rapidly changing market requirements, but it is not easy to adapt immediately. Many requirements can be solved by experienced experts. Unfortunately, access to their knowledge is increasingly limited, their education is usually expensive, there are not enough of them, and they are not always able to respond with sufficient speed.

Read More
news image

China’s Advanced AI Research

whitePaper | July 29, 2022

China is following a national strategy to lead the world in artificial intelligence by 2030, including by pursuing “general AI” that can act autonomously in novel circumstances. Open-source research identifies 30 Chinese institutions engaged in one or more of this project‘s aspects, including machine learning, brain-inspired AI, and brain-computer interfaces. This report previews a CSET pilot program that will track China’s progress and provide timely alerts.

Read More

Spotlight

Prevoty

Prevoty provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing.

Events