DATA PROTECTION AND PRIVACY IN SMART ICT

October 10, 2018

Today, modern computing techniques are capable of easily storing, processing and analyzing large amounts of and a variety of data. These techniques could correlate diverse datasets in order to create individual’s profiles, to gain insights, and to offer new digital services. Among others, three technologies that could play a major role in gaining these capabilities are Cloud computing, Internet of Things (IoT) and Big data.

Spotlight

RetailNext

RetailNext is the worldwide market leader and expert in retail analytics for brick-and-mortar retail, delivering real-time analytics that enable retailers and manufacturers to collect, analyze, and visualize in-store data. The patent-pending solution uses best-in-class video analytics, Wi-Fi detection, on-shelf sensors, and data from point-of-sale systems and other sources to automatically inform retailers about how people engage with their stores. The highly scalable RetailNext platform easily integrates with promotional calendars, staffing systems, and even weather services to analyze how internal and external factors impact customer shopping patterns – providing retailers the ability to identify opportunities for growth, execute changes, and measure success.

OTHER WHITEPAPERS
news image

Analyzing the Economic and Operational Benefits of theDell Data Protection Portfolio

whitePaper | November 29, 2022

We live in an intensely data-driven world, where data loss is unacceptable and quick access to information with real-time analytics driven by machine learning and artificial intelligence is at the core of decision making. Effective data protection is a critical component of every successful business. Now, more than ever, organizations are looking at their data protection strategies through a new lens. They are evaluating old practices, with a focus on making data protection a hands-off, efficient solution they can rely on without applying extensive IT resources. This can be accomplished through standardizing on a vendor with a comprehensive data protection offering, single management capabilities, and support across a diverse network of systems on-premises, in public and private data centers, in multiple clouds, and in remote office/branch offices (ROBO) and edge environments.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Cybersecurity Services

whitePaper | October 17, 2022

Our approach to cybersecurity includes a holistic set of services spanning Risk Assessments, Security Patching, Advisory Services and Managed Detection and, Response (MDR).

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More

Spotlight

RetailNext

RetailNext is the worldwide market leader and expert in retail analytics for brick-and-mortar retail, delivering real-time analytics that enable retailers and manufacturers to collect, analyze, and visualize in-store data. The patent-pending solution uses best-in-class video analytics, Wi-Fi detection, on-shelf sensors, and data from point-of-sale systems and other sources to automatically inform retailers about how people engage with their stores. The highly scalable RetailNext platform easily integrates with promotional calendars, staffing systems, and even weather services to analyze how internal and external factors impact customer shopping patterns – providing retailers the ability to identify opportunities for growth, execute changes, and measure success.

Events