Whitepaper
Titel
Client
Datum
The Ransomware Threat: A guide to detecting an attack before it’s too late

Is your organisation prepared for a ransomware attack? Successfully defending your organisation agains...
LogRhythm EMEA
2019-01-18
Gartner Guide: Market Guide for User and Entity Behavior Analytics

Security and risk management leaders considering UEBA (User and Entity Behavior Analytics) will find t...
LogRhythm EMEA
2019-01-18
CISOs Investigate: User Behaviour Analytics

UBA will likely be one of the more valuable additions to the technology stack. Security leaders can le...
LogRhythm EMEA
2019-01-18
Employing Machine Learning in a Security Environment: A data science-driven approach

No matter where you look in the security world today, you’ll see the terms machine learning and artifi...
LogRhythm EMEA
2019-01-18
Transparency, centralisation and management of international transactions

Today we see many CFOs are making progress towards creating a technology-enabled finance function, but...
Treasury Intelligence Solutions GmbH
2019-01-17
Why a TMS is not enough

The typical Treasury Management System (TMS) — SWIFT connected, multiuser and loaded with functionalit...
Treasury Intelligence Solutions GmbH
2019-01-17
TIS payment solutions help maximize your win with SAP S/4HANA

The time to migrate to SAP S/4HANA is now. According to SAP, more than 7,000 customers have signed up ...
Treasury Intelligence Solutions GmbH
2019-01-17
Disaster Recovery Planning for Today's Real-World Outages

Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk wh...
Commvault Systems Ltd
2019-01-10
Case Study: Travis Perkins

Travis Perkins plc is the UK’s biggest supplier of materials to the building, construction and home im...
Riverbed Technology GmbH
2019-01-10