Page 3,945«..1020..3,9443,9453,9463,947..3,9503,960..»

Interview with Jordan Blake on the potential of behavioural biometrics – The Paypers

Fraud Prevention and Online Authentication Report 2019/2020

The Paypers interviewed Jordan Blake, BehavioSec VP of Products, on the potential of behavioural biometrics and how to best use this deep authentication technology

How does BehavioSec develop the potential of behavioural biometrics and how do your customers leverage this technology?

In 2008, BehavioSec launched with a mission: to apply the nascent area of machine learning to behavioural biometrics the concept of leveraging someones behaviour to positively identify them. Today, our companys software platform protects billions of transactions across mobile apps and Websites by studying users typing patterns, touch screen gestures and even the way they hold their devices to discern authentic users behaviour from criminals, bots, or malware used to commit fraud, hijack accounts, or steal data. Customers leverage our platform in two primary ways: They use it to drastically reduce the number of legitimate end-users who are unnecessarily targeted by existing, noisy authentication signals. When an organisation isnt able to establish that an end-user is authentic, that user may be inconvenienced in a number of ways such as by having to answer obscure security questions, respond to CAPTCHAs, deal with heavy-handed password measures and may be subject to account lockouts and long phone calls to customer service. Organisations that utilise BehavioSec can significantly reduce reliance on such unfriendly safety measures.

Our platform is also leveraged to reduce fraud and the costs associated with it. Fraudsters find myriad ways to scam their way into users accounts, whether it be leveraging a shared password found in a data breach, targeting thousands of accounts with a login bot, performing a sophisticated SIM swap attack or even coaching a user over the phone (i.e. a voice-phishing or vishing attack). Regardless of the tactics used, our technology profiles authentic user behaviour in such a way that a fraudster, even with the keys to the proverbial kingdom, simply cannot replicate it.

By bringing BehavioSec into the mainstream market, our efforts are influencing the standards and norms in the industry, bringing about changes that help reduce the amount of financial loss that organisations incur every year due to cyber theft and fraud. In the fight to protect consumers from ever resourceful fraudsters and cybercriminals, behavioural biometrics offers significant advantages over other authentication technologies. We turn users into securitys strongest link by helping them stop attacks by just being themselves.

Could you thoroughly explain how continuous authentication works?

A consistent, individual signature marks the essence of human movement and touch every movement you make is influenced by personal style/preferences, speed, pressure, and dexterity. This also applies in the digital world. No one else can replicate exactly how we physically interact with our devices. BehavioSecs platform plays off this, continuously monitoring, and authenticating users based on their unique physical behaviours, throughout each session, not just once at login.

Powered by this unique application of behavioural biometrics, our companys platform integrates with websites and apps to analyse user behaviour in real time, enabling organisations to block or flag suspect transactions.

This anti-fraud protection surpasses one-time authentication measures like passwords and thumbprints by enabling organisations to invisibly and unobtrusively authenticate users by validating their personal mannerisms.

In which way is behavioural biometrics relevant in the PSD2s SCA context?

The PSD2 mandates that payment service providers must ensure Strong Customer Authentication (SCA), which comprises at least two factors from three different categories knowledge (e.g. password), possession (e.g. smartphone), and inherence (e.g. unique attributes of an individuals behaviour, like patterns in how users hold their mobile devices and interface with websites and browsers). Behavioural biometrics is an ideal technology for PSD2 compliance because it combines inherence with traditional login credentials, offering dramatically enhanced defences from account hijacking and fraud. Every customer and business handling online payments face mounting threats of fraud and abuse because login credentials are widely breached, and it is trivial for bots and other malicious programs to impersonate account holders names and devices. Behavioural biometrics breaks this cycle by giving institutions and payment companies the ability to block login attempts that deviate from known users behaviours.

There are several challenges for behavioural biometrics application related to privacy, impersonation attack (spoofing), and even error rates. How does your company meet these challenges to make this technology work at its best?

Privacy can be very well managed with this technology. For example, we do not gather or use any end user biometric data, nor are we interested in capturing PII like credentials. We provide the software platform that our customer organisations around the world then administer in their operations to protect their services and consumers.

Additionally, another benefit of our platform is the accuracy and low error rates. The platform has proven itself to yield low false positive alerts and delivers detailed information for real-time fraud detection and forensic purposes. Our customers discover measurable cost savings from lower fraud incidences, coupled with fewer customer support calls and false positive issues associated with traditional authentication tools across billions of transactions and millions of users.

What other developments do you have in the pipeline for 2020?

Our goal is to enable customers to mitigate risk and further link security and trust to their brands. We have ongoing product updates being introduced that further strengthen BehavioSecs platform and break the otherwise chronic password breach cycle.

About Jordan Blake

Jordans role as BehavioSecs VP of Products drives the vision and growth of cyber safety solutions while in addition to ensuring quality and client satisfaction. His 20-year career in product management, internet security, cyber security, and cyber safety solutions makes him the best choice to lead the product division. Jordan has held many Product Management roles with global industry leaders like IBM, and Symantec.

About BehavioSec

Founded in 2008 out of groundbreaking academic research, BehavioSecs technology allows companies to continuously verify digital identities with superior precision, in real-time. BehavioSec is the only enterprise-grade vendor used in global deployments safeguarding billions of transactions. BehavioSec investors include Forgepoint Capital, Cisco, ABN AMRO, Conor Ventures and Octopus Ventures.

See original here:
Interview with Jordan Blake on the potential of behavioural biometrics - The Paypers

Read More..

Cyren (NASDAQ:CYRN) Stock Rating Lowered by Zacks Investment Research – Riverton Roll

Zacks Investment Research cut shares of Cyren (NASDAQ:CYRN) from a strong-buy rating to a hold rating in a report published on Tuesday morning, Zacks.com reports.

According to Zacks, Cyren Ltd. provides messaging, antivirus and Web security solutions. The Companys messaging solutions include anti-spam, Outbound Spam Protection for service providers, Zero-Hour virus outbreak protection and GlobalView Mail Reputation services, as well as Command Antivirus and GlobalView URL Filtering services. It offers its solutions to network and security vendors offering content security gateways, unified threat management solutions, network routers and appliances, anti-virus solutions and to service providers, such as software-as-a-service vendors, Web hosting providers and Internet service providers. Cyren Ltd., formerly known as Commtouch Software Ltd., is headquartered in Herzliya, Israel.

Cyren stock opened at $1.28 on Tuesday. The stock has a market capitalization of $75.93 million, a PE ratio of -4.13 and a beta of 0.28. Cyren has a twelve month low of $1.11 and a twelve month high of $2.79. The company has a quick ratio of 0.90, a current ratio of 0.90 and a debt-to-equity ratio of 0.49. The company has a 50 day moving average of $1.31 and a 200-day moving average of $1.54.

Cyren (NASDAQ:CYRN) last released its quarterly earnings results on Wednesday, November 13th. The technology company reported ($0.06) earnings per share for the quarter, beating the Thomson Reuters consensus estimate of ($0.07) by $0.01. The company had revenue of $9.50 million during the quarter, compared to analysts expectations of $9.80 million. Cyren had a negative net margin of 47.56% and a negative return on equity of 68.95%. Equities analysts anticipate that Cyren will post -0.3 EPS for the current fiscal year.

Several institutional investors have recently added to or reduced their stakes in CYRN. BlackRock Inc. acquired a new position in shares of Cyren in the second quarter valued at approximately $25,000. Renaissance Technologies LLC raised its position in Cyren by 1.0% during the second quarter. Renaissance Technologies LLC now owns 648,763 shares of the technology companys stock worth $1,122,000 after acquiring an additional 6,130 shares in the last quarter. Finally, White Pine Capital LLC raised its position in Cyren by 33.2% during the second quarter. White Pine Capital LLC now owns 689,480 shares of the technology companys stock worth $1,193,000 after acquiring an additional 171,680 shares in the last quarter. Institutional investors own 52.06% of the companys stock.

About Cyren

CYREN Ltd., together with its subsidiaries, provides information security solutions for protecting Web, email, and mobile transactions worldwide. The company operates Cyren Cloud Security, a SaaS security platform, which provides Internet security services, including Web Security that provides the enforcement of Web policy and state-of-the-art threat protection for business users; DNS Security, which allows businesses to protect employees at headquarters, visitors in remote offices, customers at retail stores, or students on a campus; Email Security, a cloud-based secure email gateway; and Cloud Sandboxing that protects businesses against breaches and data loss from threats.

Read More: Derivative

Get a free copy of the Zacks research report on Cyren (CYRN)

For more information about research offerings from Zacks Investment Research, visit Zacks.com

Receive News & Ratings for Cyren Daily - Enter your email address below to receive a concise daily summary of the latest news and analysts' ratings for Cyren and related companies with MarketBeat.com's FREE daily email newsletter.

The rest is here:
Cyren (NASDAQ:CYRN) Stock Rating Lowered by Zacks Investment Research - Riverton Roll

Read More..

EZVIZ C6CN pan-and-tilt security camera review: Motion tracking keeps intruder in this camera’s sights – TechHive

The EZVIZ C6CN Internet PT Camera is an indoor pan-and-tilt security camera that can lock on to an intruder and follow their movements, potentially capturing more complete footage of a crime. The 1080p camera delivers fantastic video quality with comprehensive room coverage at an attractive price, but its most notable feature feels a little too shaky to trust completely in the event of an actual break-in. Its bounty of other security features, however, are rock solid.

The C6CNs body is slightly bigger than a baseball and rotates 340 degrees on its base. The camera itself tilts within this enclosure 120 degrees. You can control its pan-and-tilt feature from the app or set it to automatically track motion. That, paired with the cameras 94-degree viewing angle, should provide full coverage without blind spots in just about any room.

The camera provides essential security features including motion detection alerts and night vision. Although it does not detect audio events, you can listen in on the environment and engage in two-way conversations with the help of an onboard mic in the front of the unit and a speaker in back. When youre home, you can activate a privacy shutter to cover the lens.

The C6CN can track moving objects for more complete video evidence.

The EZVIZ C6CN offers multiple storage options for captured video: You can save clips locally to a microSD card (up to 256GB, but youll need to provide the card), or to the EZVIZ NVR (network video recorder, sold separately for $230). Encrypted cloud storage is also available: A seven-day storage plan costs $6 per month or $60 annually, while 30 days of storage costs $11 per month or $110 annually. Other plans are available if you want to support more than one EZVIZ camera (up to four).

The cameras base lets it sit freely on any flat surface, but hardware and a mounting template are also included if you want to attach it to a wall or ceiling. Once youve positioned the camera and plugged it in, the bulk of the setup takes place in the EZVIZ app. After scanning a QR code on the camera, the app has you login to your Wi-Fi network and a voice assistant confirms each step of the connection process. (The camera also has an ethernet port if youd prefer to wire it to your router.)

The camera connected to my Wi-Fi without any hiccups and within a few moments, a screenshot of my living room appeared on the apps device page. Tapping the image opened the C6CNs live stream. The layout here mirrors that for other EZVIZ cameras, with basic camera controls, a video-history timeline, and deeper settings all easily accessible.

You can manually pan-and-tilt the camera with an in-app directional pad.

The first time I tapped the pan-and-tilt control it took a 360-degree picture of the room. Moving a few degrees at a time, it stitched together a succession of still shots and presented me with a panoramic photo that I could scroll through for a complete view.

Aside from revealing how messy the room was at the time, it also provided a quick way to see the whole scene in context, which can be incredibly handy if youre trying to capture evidence of a crime. You can retake the 360-degree picture on demand by clicking the appropriate tab at the bottom of the screen.

You control the pan-and-tilt feature using an in-app directional pad. The camera moves smoothly and fairly quietly, though there is some delay between when you stop pressing the pad and when the camera stops moving. The latency is fairly minimal, though, and the camera stopped in the general position I was trying to get it to.

Motion tracking, which you must enable, will lock onto a moving object and follow it. The forensic benefits are pretty clearan intruder cant evade being recorded by simply moving out of frame. Though the cameras movements in this mode are much more halting, the C6CN shadowed me pretty faithfully. There were a couple of variables that could trip it up though.

One was the amount of light in the room. As long as there was enough illumination, even if it only came from the cameras excellent night vision, motion tracking was flawless. But when the light varied, such as one morning when my living room was well-lit by sunlight, but the adjoining kitchen was in heavy shadow, the camera would lose track of me as soon as I stepped into the darker area. It would then pick me up again only when I returned to the brighter room. Ive used other motion-tracking cameras, including EZVIZs own CTQ6C pan-and-tilt camera, in similar lighting scenarios and havent encountered this issue.

Less surprisingly, the other scenario in which motion tracking had trouble was multiple moving bodies. If one of my pets and I were both in the room, the camera would lock on to whichever was closest to it and ignore the other one. That made for some herky-jerky video as we both moved around the room, so its easy to imagine the havoc it would cause if you were unfortunate enough to be visited by two intruders at the same time.

Whether or not I was using motion tracking, the cameras motion detection alerts were always accurate and delivered with a snapshot of the triggering person or pet. The app offers several ways to modify the frequency of notifications, including schedulingyou can set up to four time blocks per day when motion detection and recording is activedetection sensitivity adjustment, and customizable motion detection areas.

This last feature, which lets you mask in the areas you want monitored for movement, cant be used with motion tracking as it requires a fixed camera angle to work.

The C6CN is fleshed out with a few smart-home capabilities. If you have an Amazon Alexa or Google Assistant smart display, you can use voice commands to display the cameras live feed on that device. You can also activate a few IFTTT applets, available in the app, that will enable automations such as putting the camera into privacy mode when you arrive home and turning on your WeMo switch when the camera detects motion.

Motion tracking is a fairly premium security feature, so the fact that you can get it at such an affordable price makes the EZIVZ C6CN worth considering. It is not, however, the only budget-friendly option out there. The Blurams Dome Pro is a pan-and-tilt camera that also features motion trackingplus human detection and facial recognitionfor a comparable price.

And though the older EZVIZ CTQ6C has been removed from the companys website, that camera was still available on Amazon at press time for about the same price It offers virtually the same set of features, but I its motion tracking worked better for me. Its worth investigating all three before making a final decision.

See more here:
EZVIZ C6CN pan-and-tilt security camera review: Motion tracking keeps intruder in this camera's sights - TechHive

Read More..

Password Managers: What Are They & How to Use Them? – TechAcute

There are a lot of password managers out there. In this article, you can find out why you should use them, how to use them, and what do they provide you with.

The dependency on online services is increasing day by day. Thus a large amount of confidential data like credit card numbers, bank account details, and account passwords are being stored on servers, always under the risk of getting stolen in a data breach incident. The Internet and online business for people are becoming inevitable in todays world, and because of that, online security is in high demand. People tend to keep passwords that are easy to remember, and this is what hackers take advantage of.

Passwords containing names, phone numbers, etc. are often easily guessable or can be cracked easily with a word list. A secure password must contain arbitrary numbers, characters, and special characters and must be at least eight characters long. Brute forcing these passwords would seem infeasible if they are long enough, containing arbitrary characters and numbers. Keeping secure, non-guessable passwords should be the highest priority when creating an online account, keeping in mind the consequences of not doing so. Using arbitrary passwords is the safest way to secure an online account.

Password managers are not a new concept. They have been in existence for more than a decade now. Password managers usually come as a bundle with three key features:

Some password managers implement a local database to store all the passwords while some use remote encrypted online stores. For example, Keeper Password Manager & Digital Vault has that kind of feature. It also provides users with dark web protection, secured cloud vault & encrypted chat services for the ultimate protection for your business and personal use. You can find more specific information about Keeper Password Manager & Digital Vault here. These password managers are accessible through web applications or mobile applications. Apart from these, hardware devices can also be used as password managers.

Using password managers that use a single master password to encrypt all your account passwords, so that it can provide you with better cybersecurity and information requires a central authority that stores the encrypted data on a server. Retrieving these passwords from the server requires an active Internet connection. To tackle this, the password managers tend to store the encrypted vault on the users device. If the device is stolen/lost, or if the master password is not strong enough, all the data may be compromised.

Storing private data on central servers may often produce a feeling of mistrust since there is always a chance of data getting breached. Even though hardware password managers are secure, it involves carrying the hardware device everywhere. If the device is lost, as no online backups are kept, all the password data is lost. Some password managers are local-storage-based but use a web interface to interact with the user. A small flaw in the algorithm design may break the complete system. Also, one has to ensure that the data from the server is synced with multiple instances of the app on various platforms like mobile, computers, smartwatches, and so on. If they are not in sync, a newly added password to the vault may not be accessible from a different or new device. A personal device on which the password manager app is stored is always needed to access the passwords.

The master password generator algorithm is an algorithm that doesnt store passwords anywhere. The setup starts with the user selecting a master password. Then, the user enters the website for which he/she wants a password. Afterward, the user selects the type of password numeric, alphanumeric, character only, or a passphrase. The algorithm generates a new, secure, and unique password for the website. The user then sets this generated password as the password for the site. This algorithm ensures that every time you enter the master password and the website name correctly, it will produce the same password as generated initially.

Thus, passwords are created on-the-fly. The only inconvenience involved in this method is changing the existing insecure website passwords to these newly generated passwords, which is to be done just once. After the initial setup phase, the algorithm will always create the desired password, provided that the master password, website name, and password type are the same. This algorithm does not restrict itself to generating arbitrary passwords. It can also create PINs or even passphrases.

A passphrase is a set of unpredictable but meaningful words used together as a password. They are easy to remember due to the usage of common words, and the master password uniquely produces them. The major advantage of this password manager is that there is no way of breaching any data. Also, there is no way for the attacker to know whether his/her guess of the master password is correct or not since the master password algorithm will always have a unique set of passwords associated with the master password. The algorithm can be implemented as a web, mobile, or a standalone desktop application, with the same algorithm implemented on all platforms.

The algorithm can be deployed as a complete password manager application, running cross-platform. An extension to this can be to the creation of a browser plugin/extension that can be used to auto-fill passwords on websites. The password generation algorithm is not restricted to a particular programming language. The accessibility of the password manager is crucial, and hence it should be implementable on a variety of platforms, which includes websites, phone applications, and desktop applications. It may also be possible to create a stand-alone hardware device that will have a biometric sensor, USB HID (human interface device) capability, and buttons for site selection.

Such a device could be attached to any device that accepts USB keyboards, and the generated passwords can then be entered without a driver. However, requirements for such hardware to existing are algorithms that can produce a hash based on fingerprint minutiae that must be studied and carefully applied. Such a hardware device will be cost-effective to construct, would work for any person (no storage and no vendor lock-in), and on any device which accepts USB HID keyboard input. If device manufacturers deem fit, all upcoming devices can implement this functionality by default, virtually eliminating the need ever to remember passwords or use weak ones.

Photo credit: The feature image has been done by Jezael Melgoza. The photo of the USB dongle has been taken by Sara Kurfe. The picture woman in black was prepared by Donny Jiang. The photo womens blue denim jeans was done by Joshua Gandara.Source: Sophie Anderson (Safety Detectives) / Alison Grace Johansen (NortonLifeLock) / Merriam-WebsterEditorial notice: This article has been made possible by site supporters.

Link:
Password Managers: What Are They & How to Use Them? - TechAcute

Read More..

Healthcare Cloud Computing World Market Analyses; 2014-2019 & 2020-2026 – Yahoo Finance

DUBLIN, Jan. 17, 2020 /PRNewswire/ -- The "Healthcare Cloud Computing Market Size, Share & Trends Analysis Report By Application, By Deployment Model (Private, Public, Hybrid), By Pricing Model, By Service Model, By End Use (Providers, Payers), And Segment Forecasts, 2019 - 2026" report has been added to ResearchAndMarkets.com's offering.

Research and Markets Logo

The global healthcare cloud computing market size is expected to reach USD 27.8 billion by 2026, exhibiting a CAGR of 11.8% over the forecast period.

The associated benefits of data analytics and increase in demand for flexible & scalable data storage by healthcare professionals is expected to drive the demand for these services over the forecast period.

Healthcare organizations are digitalizing their IT infrastructure and deploying cloud servers to improve features of systems. These solutions help organizations in reducing infrastructure cost & interoperability issues and aid in complying with regulatory standards. Hence, rising demand from health professionals to curb IT infrastructure costs and limit space usage are anticipated to boost market growth over the forecast period.

Increase in government initiatives undertaken to develop and deploy IT systems in this industry is one of the key drivers of this market. Moreover, increase in partnerships between private & public players and presence of a large number of players offering customized solutions are some of the factors anticipated to drive demand in the coming years.

Further key findings from the study suggest:

Key Topics Covered

Chapter 1 Methodology & Scope

Chapter 2 Executive Summary2.1 Market Outlook2.2 Segment Outlook2.3 Competitive Insights

Chapter 3 Healthcare Cloud Computing Market Variables, Trends, and Scope3.1 Market Lineage Outlook3.1.1 Parent market outlook3.1.2 Ancillary market outlook3.2 Penetration & Growth Prospect Mapping3.3 User Perspective Analysis3.3.1 Consumer behavior analysis3.3.2 Market influencer analysis3.4 List of Key End Users3.5 Regulatory Framework3.6 Market Dynamics3.6.1 Market driver analysis3.6.2 Market restrain analysis3.6.3 Industry challenges3.7 Healthcare Cloud Computing: Market Analysis Tools3.7.1 Industry analysis - Porter's3.7.2 PESTLE analysis3.7.3 Major deals and strategic alliances3.7.4 Market entry strategies

Chapter 4 Healthcare Cloud Computing Market: Segment Analysis, by Application, 2014-2026 (USD Million)4.1 Definition and Scope4.2 Application Market Share Analysis, 2018 & 20264.3 Segment Dashboard4.4 Global Healthcare Cloud Computing Market, by Application, 2015 to 20264.5 Market Size & Forecasts and Trend Analyses, 2015 to 20264.5.1 Clinical information systems4.5.2 Non-clinical information systems

Chapter 5 Healthcare Cloud Computing Market: Segment Analysis, by Deployment Methods, 2014 - 2026 (USD Million)5.1 Definition and Scope5.2 Deployment Methods Market Share Analysis, 2018 & 20265.3 Segment Dashboard5.4 Global Healthcare Cloud Computing Market, by Deployment Methods, 2015 to 20265.5 Market Size & Forecasts and Trend Analyses, 2015 to 20265.5.1 Private cloud5.5.2 Public cloud5.5.3 Hybrid cloud

Chapter 6 Healthcare Cloud Computing Market: Segment Analysis, by Pricing Model, 2014 - 2026 (USD Million)6.1 Definition and Scope6.2 Deployment Methods Market Share Analysis, 2018 & 20266.3 Segment Dashboard6.4 Global Healthcare Cloud Computing Market, by Pricing Model, 2015 to 20266.5 Market Size & Forecasts and Trend Analyses, 2015 to 20266.5.1 Pay-as-you-go6.5.2 Spot pricing

Chapter 7 Healthcare Cloud Computing Market: Segment Analysis, by Services Model, 2014 - 2026 (USD Million)7.1 Definition and Scope7.2 Deployment Methods Market Share Analysis, 2017 & 20267.3 Segment Dashboard7.4 Global Healthcare Cloud Computing Market, by Service Models, 2015 to 20267.5 Market Size & Forecasts and Trend Analyses, 2015 to 20267.5.1 Software-as-a-service7.5.2 Infrastructure-as-a-Services7.5.3 Platform-as-a-Service

Chapter 8 Healthcare Cloud Computing Market: Segment Analysis, by End Use, 2014 - 2026 (USD Million)8.1 Definition and Scope8.2 End-use Methods Market Share Analysis, 2018 & 20268.3 Segment Dashboard8.4 Global Healthcare Cloud Computing Market, by End Use, 2015 to 20268.5 Market Size & Forecasts and Trend Analyses, 2015 to 20268.5.1 Healthcare providers8.5.2 Healthcare payers

Chapter 9 Healthcare Cloud Computing Market: Regional Market Analysis, 2014 - 2026 (USD Million)9.1 Definition & Scope9.2 Regional Market Share Analysis, 2018 & 20269.3 Regional Market Dashboard9.4 Regional Market Snapshot9.5 Regional Market Share and Leading Players, 20189.6 SWOT Analysis, by Factor (Political & Legal, Economic and Technological)9.7 Market Size, & Forecasts, Volume and Trend Analysis, 2018 to 20259.8 North America9.9 Europe9.10 Asia-Pacific9.11 Central & South America9.12 MEA

Chapter 10 Healthcare Cloud Computing Market - Competitive Analysis10.1 Recent Developments & Impact Analysis, by Key Market Participants10.1.1 Ansoff Matrix10.1.2 Heat Map Analysis10.2 Company Categorization10.2.1 Innovators10.3 Company Profiles10.3.1 NextGen Healthcare10.3.2 Carestream Corporation10.3.3 INFINITT Healthcare10.3.4 Dell Inc.10.3.5 NTT DATA Corporation10.3.6 Sectra AB10.3.7 Allscripts10.3.8 Ambra Health10.3.9 Nuance Communications10.3.10 Siemens Healthineers

Chapter 11 KOL Commentary11.1 Key Insights11.2 KOL Views

For more information about this report visit https://www.researchandmarkets.com/r/3m00oc

Story continues

See the article here:
Healthcare Cloud Computing World Market Analyses; 2014-2019 & 2020-2026 - Yahoo Finance

Read More..

A Top Cloud Stock to Buy in 2020 and Hold for the Long Run – Motley Fool

The cloud computing industry has been growing at a nice clip for the past few years, and it isn't expected to slow down anytime soon. IDC estimatesthat public cloud spending will hit $500 billion by 2023 from $229 billion last year. That translates into a compound annual growth rate of 22.3%, which would be driven by increasing demand for Software-as-a-Service (SaaS) by corporations and enterprises.

Gartner, for instance, forecaststhat SaaS revenue could jump over 50% by 2022. Nutanix (NASDAQ:NTNX) is one cloud stock investors can buy to take advantage of the growth in public cloud spending, as it stands to win big from the SaaS vertical. Let's see how.

Image source: Getty Images.

Nutanix has quickly transformed itself from selling hardware appliances to a software-centric business model in the space of just fivequarters. The company was getting a quarterof its revenue from selling hardwarefor hyper-converged cloud infrastructure before the pivot happened. But that business had weak margins and the prospects looked bleak thanks to ballooning memory costs.

In fact, Nutanix's gross profit margin was 61.9% when Nutanix announcedthe software pivot. The metric was moving in the wrong direction as hardware costs pressured the company's margin profile. The story is much different now, as Nutanix has started getting a big chunk of its revenue from software sales.

NTNX Gross Profit Margin data by YCharts

In the firstquarter of fiscal 2020, Nutanix's software and support revenue came in at $305 million, an increase of 9% over the prior-year period. The company's total revenue stood at $314.8 million, which means that hardware sales have been reduced to a tiny portion of the company's overall business. More specifically, Nutanix got just $9.7 million in revenue from hardware sales last quarter as compared to $32.5 million in the year-ago period.

Subscription-only sales clockedimpressive annual growth of around 71% to almost $218 million. However, one-time software sales plunged to $77.5 million from $146.5 million a year ago as Nutanix's transition to a software-centric model continued. This means that Nutanix now gets just over 69% of its total revenue from selling software subscriptions.

So, the company still has some way to go before it completely eliminates its legacy hardware and software businesses. Nutanix has set itself a targetof generating 75% of total billings from the subscription business by the end of the current fiscal year. It is close to attaining that target, as now 72.5% of billingsin the first quarter came from subscriptions.

It won't be surprising to see Nutanix's subscription business supply a greater proportion of the overall revenue in the future, considering the pace of growth in its deferred revenue. The company's deferred revenue shotup 39% annually to $975 million during the first quarter of fiscal 2020, while its overall revenue was flat on a year-over-year basis at $314.8 million.

Deferred revenue is the amount of money collected by a company in advance for services that will be rendered at a future date. The deferred revenue is recognized on the income statement when services are actually delivered.

For Nutanix, this means that the company's subscription business is succeeding. In fact, the average contract term of Nutanix's subscription customers stoodat 3.9 years in the last reported quarter. This points toward long-term growth at Nutanix, as the company is able to lock customers in long-term contracts.

What's more, Nutanix's existing customers are spending more money on its services. That's evident from the company's 132% dollar-based net expansion ratelast quarter. This is considered to be a solidnumber for a SaaS company as per Crunchbase estimates, which puts the industry average at 106%. Additionally, Nutanix was able to retain 97% of its customers last quarter.

In all, Nutanix looks like a solid cloud computing bet, as it is operating in a fast-growing market and is pulling the right strings to increase both margins and revenue. Mordor Intelligence estimates that the hyper-converged cloud infrastructure market will clock13% annual growth from 2020 to 2025. The growth in Nutanix's software business suggests that it is growing at a faster pace than the industry it operates in.

This makes Nutanix an attractive bet for anyone looking to buy a top stock for the long run.

See the article here:
A Top Cloud Stock to Buy in 2020 and Hold for the Long Run - Motley Fool

Read More..

Global IT compensation is at an all-time high, thanks to skills trainings – TechRepublic

IT professionals earned an average of $5,000 more in 2019, all because of job performance, Global Knowledge found.

The average annual salary for IT professionals worldwide is $89,732the highest yet found by Global Knowledge's yearly report. The report is the largest worldwide study of professionals in the tech community and has been conducted every year for more than a decade.

IT professionals earned an average of $5,000 more in 2019 than in 2018, with the main reason being improved job performance, the report found.

This increase in both salaries and performance quality indicates that more people are taking steps to progress their professional development, resulting in better performance and more compensation, according to the report.

SEE: Why IT pros need soft skills to advance their careers (free PDF) (TechRepublic)

Global Knowledge's 2019 IT Skills and Salary Survey used the Qualtrics Insight platform to tabulate submissions. The survey was sent out via email to recipients in the Global Knowledge database and yielded 12,271 responses, with more than half (54%) from the US and Canada, and the rest from other countries around the world.

Globally, the highest salaries in various functional areas included cloud computing ($115,889), IT architecture and design ($98,580), project management ($98,344), and cybersecurity ($97,322). The report also broke down salaries by region.

SEE: How to become a cybersecurity pro: A cheat sheet (free PDF) (TechRepublic)

North America

North American IT professionals earned $109,985 on average, which is 23% more than the worldwide average mentioned previously. These professionals also saw a 6% raise in salary in 2019 and 50% received bonuses, according to the report.

US IT professionals, in particular, earned higher average salaries than those in any other region at $113,639, which is largely due to geography. While salaries along the coasts were the highest, those locations are also where the cost of living is the most expensive, the report found.

In Canada, the average annual salary is $74,048, with the highest paying IT professionals living in Quebec and making around $77,897.

The highest paying job function areas in North America included executives ($148,034), cloud computing ($138,320), and IT architecture and design ($126,095), according to the report.

Latin America

In Latin America, IT professionals earned an average of $41,465. IT decision makers in this region make significantly more than their staff--a 44% difference. IT decision makers also saw the highest raise percentage out of all regions at 9%, while their IT staff only saw a 5% increase, the report found.

The functional areas with the highest salaries were executives ($68,253), cloud computing ($50,480), and project and program management ($48,478), according to the report.

Europe, the Middle East and Africa (EMEA)

The average salary for IT professionals in EMEA was $70,445, with IT staff seeing a 6% raise and IT decision makers seeing a 5% raise, which was in line with the worldwide average raise percentages, the report found.

Within Europe, Switzerland dominated the salaries with an average of $136,301. Norway had the second highest at $97,525, followed by Germany at $95,456, according to the report.

The highest paying function areas in EMEA were executives ($101,523), cloud computing ($99,290), and IT architecture and design ($83,606), the report found.

Asia-Pacific

IT professionals in the Asia-Pacific area made on average $65,738 per year. Similar to Latin America, the ratio between the salaries of IT decision-makers and IT staff is significant, at 38% difference.

However, the raise percentages for IT decision makers and IT staff are the same, at 5%, the report found.

The highest paying function areas for the Asia-Pacific region were executives ($108,794), cloud computing ($84,764), and program and project management ($74,608), according to the report.

A commonality across all regions was that every area received some percentage of a raise. As previously stated, salaries were higher in this edition of the report than any other. This survey aimed to discover the reason behind the shift.

Respondents said that the top factors that increased salary included their current job performance (42%), a standard company increase (39%), a promotion within the company (15%), and a cost of living increase (15%).

A particularly interesting reason behind a pay raise was the development of new skills (9%), the report found. Those same individuals who said they developed new skills of added value reportedly earned nearly $12,000 more than last year, indicating reskilling and upskilling training sessions pay off, according to the report.

Learning and development is often overlookedor not prioritized in companies, which is harmful to both employees and companies. The majority of employees (94%) say they would stay longer at an organization if they were offered opportunities to learn and grow, LinkedIn's 2019 Workforce Learning report found.

Upskilling and reskilling employees is particularly crucial in the era of digital transformation; as technology is constantly changing and evolving, employees need to do the same.

Rather than firing and rehiring workers with every technological shift, companies should instead allocate resources toward intellectual growth and skills. And Growth Knowledge's report is evidence that the skills training does its job.

For more, check out Impressive professional development benefits from Amazon, Google, Microsoft, and more on TechRepublic.

We deliver the top business tech news stories about the companies, the people, and the products revolutionizing the planet. Delivered Daily

See more here:
Global IT compensation is at an all-time high, thanks to skills trainings - TechRepublic

Read More..

Middle East Cloud Applications Market Worth $4.5 Billion by 2024 – Exclusive Report by MarketsandMarkets – PR Newswire UK

CHICAGO, Jan. 17, 2020 /PRNewswire/ -- According to a new research report"Middle East Cloud Applications Marketby Application (ERP, CRM, HCM, SCM, and Business Intelligence and Analytics), Organization Size, Vertical (BFSI, Manufacturing, and Telecommunications), and Country - Forecast to 2024", published by MarketsandMarkets, the Middle East Cloud Applications Market is expected to grow from USD 2.0 billion in 2019 to USD 4.5 billion by 2024, at a Compound Annual Growth Rate (CAGR) of 17.5% during the forecast period.

The growing demand for cloud-based services and advanced technologies, increasing need to engage with customers, and deliver an enriched experience continuously are some of the major factors driving the growth of the Middle East Cloud Applications Market.

Browsein-depth TOC on"Middle East Cloud Applications Market"

38 Tables

28 Figures

110 Pages

Download PDF Brochure:

https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=262938413

Among applications, cloud-based CRM applications to grow at a higher rate during the forecast period

Cloud Customer Relationship Management (CRM) enables enterprises to store and utilize customer data at scale to offer better services and manage relationships with customers. Cloud-based CRM is gaining popularity among enterprises due to various benefits it offers, such as easy accessibility, affordability (especially for Small and Medium-sized Enterprises [SMEs]), rapid implementation, easy upgradation, scalability, and integration capability with other data sources. Cloud-based CRM applications centralize the customer database and provide a comprehensive view of all interactions with customers, offer instant access to real-time insights of sales opportunities, and automate task management processes. With ease of use and affordability, it increases customer retention rates making business more successful. Salesforce, Zoho, Oracle, Microsoft, and Oracle are some leading vendors offering cloud CRM.

The retail and consumer goods vertical is one of the fastest-growing verticals in the region

Factors driving the adoption of cloud applications are the rising purchasing power of customers and the need to satisfy customer expectations, which leads to existing customer retention and new customer acquisition. Online retailing and cloud technologies have significantly disrupted the retail and consumer goods vertical leading to the adoption of cloud computing mainly for storage, backup, and security services. Cloud computing services enable retailers to access customer data with just 1 click from any store located anywhere, thus leading to better customer service delivery. For instance, Hallmark Cards is a retail shop with a number of stores worldwide and is known for selling greeting cards and other products. This store is leveraging the private cloud to store its data and manage all operations, such as conducting real-time inventory tracking, enabling employees to focus on delivering enhanced customers experience, and business critical activities.

Speak to Our Expert Analyst:

https://www.marketsandmarkets.com/speaktoanalystNew.asp?id=262938413

Saudi Arabia to have the largest market size during the forecast period

Saudi Arabia is accelerating the adoption of Information Technology (IT) services in recent years. The country's regulatory body, Communications and Information Technology Commission (CITC) has regulated Cloud Computing in Saudi Arabia by publishing the Cloud Computing Regulatory Framework (CCRF) on its website. The CCRF aims to provide clarity and certainty on the rights and obligations of Cloud Service Providers (CSPs) and users of cloud services. This shows the interest of the government to accelerate the adoption of cloud-based services in this country. The key factors driving the adoption of the cloud technology in this country include reduced costs, improved infrastructure efficiency, and enhanced scalability.

Market Players:

Major vendors offering Middle East Cloud Applications Market across the globe includes SAP (Germany), Oracle (US), Microsoft (US), Infor (US), Salesforce (US), Sage Group (UK), IBM (US), Epicor (US), 3I Infotech (India), Ramco Systems (India), Prolitus Technologies (India), IFS (Sweden), and QAD (US).

Browse Adjacent Markets: Cloud Computing Market Research Reports & Consulting

About MarketsandMarkets

MarketsandMarkets provides quantified B2B research on 30,000 high growth niche opportunities/threats which will impact 70% to 80% of worldwide companies' revenues. Currently servicing 7500 customers worldwide including 80% of global Fortune 1000 companies as clients. Almost 75,000 top officers across eight industries worldwide approach MarketsandMarkets for their painpoints around revenues decisions.

Our 850 fulltime analyst and SMEs at MarketsandMarkets are tracking global high growth markets following the "Growth Engagement Model GEM". The GEM aims at proactive collaboration with the clients to identify new opportunities, identify most important customers, write "Attack, avoid and defend" strategies, identify sources of incremental revenues for both the company and its competitors. MarketsandMarkets now coming up with 1,500 MicroQuadrants (Positioning top players across leaders, emerging companies, innovators, strategic players) annually in high growth emerging segments. MarketsandMarkets is determined to benefit more than 10,000 companies this year for their revenue planning and help them take their innovations/disruptions early to the market by providing them research ahead of the curve.

MarketsandMarkets's flagship competitive intelligence and market research platform, "Knowledge Store" connects over 200,000 markets and entire value chains for deeper understanding of the unmet insights along with market sizing and forecasts of niche markets.

Contact: Mr. Shelly Singh MarketsandMarkets INC. 630 Dundee Road Suite 430 Northbrook, IL 60062 USA: +1-888-600-6441 Email: sales@marketsandmarkets.comVisit Our Website: https://www.marketsandmarkets.comResearch Insights:https://www.marketsandmarkets.com/ResearchInsight/middle-east-cloud-application-market.aspContent Source: https://www.marketsandmarkets.com/PressReleases/middle-east-cloud-application.asp

Logo: https://mma.prnewswire.com/media/660509/MarketsandMarkets_Logo.jpg

SOURCE MarketsandMarkets

Link:
Middle East Cloud Applications Market Worth $4.5 Billion by 2024 - Exclusive Report by MarketsandMarkets - PR Newswire UK

Read More..

Job of the Week: Head of Research Computing at the Norwich Biosciences Institute – insideHPC

The Norwich Biosciences Institute Partnership is seeking a new Head of Research Computing in our Job of the Week.

We have an exciting opportunity for a strategic High-Performance Computing (HPC) leader to take accountability for the future development of research computing across one of the UKs foremost research organisations. The Head of Research Computing will set the future technology strategy and service model for mission-critical research IT services at NBI.

The Norwich Biosciences Institutes (NBI) are a cluster of internationally renowned research organisations. The institutes work together to tackle the major challenges facing us all in the 21st Century the sustainability of our environment; our food supplies and healthy ageing. Across NBI, there are over 1,000 scientists working to find realistic and practical solutions to these challenges. We then provide the infrastructure and support to translate their discoveries into commercially-successful businesses.

This vital, and impactful, new role will have end-to-end ownership for the provision of our research computing shared-service. The Head of Research Computing will lead the development and delivery of research computing provision across NBI, including the strategic evolution of the technology roadmap, incorporating contemporary approaches such as flexible cloud computing based HPC provision.

The Role:

Looking for a new gig? OurJobs Boardhelps companies of all sizes hire the best talent and offers the best opportunity for job seekers to get hired.

Are you paying too much for your job ads?Priced atjust$99.99 dollars for 90 days, ads on our insideHPC Jobs boardare a great way to reach the top supercomputing professionals.

Post a Job

Link:
Job of the Week: Head of Research Computing at the Norwich Biosciences Institute - insideHPC

Read More..

Blockchain is the top skill for 2020, LinkedIn says – CoinGeek

Blockchain has emerged as the leading hard skill sought by employers for 2020. In its latest report, the professional networking company found that blockchain was sought by employers more than cloud computing, artificial intelligence and UX design.

The annual report on the most in-demand skills by LinkedIn gives a comprehensive look on what employers are on the lookout for from their employees. In 2019, cloud computing led the list of hard skills, with artificial intelligence and analytical reasoning following suit. Blockchain wasnt even in the top ten. However, in a complete change of fortunes, employers are now more interested in those possessing blockchain skills than any other skill.

LinkedIn pointed out that blockchains rise has been aided greatly by its breakout from its traditional financial industry connection and into other industries. Supply chain, gaming, pharmaceuticals, insurance and legal industries are all using the technology. This has opened up more opportunities and led to the skyrocketing of the demand in blockchain skills.

The demand for blockchain skills varies from one country to the next. However, in most leading economies such as the U.S., the U.K., Germany, France and Australia, its the most in-demand skill.

The report stated, The business world, however, is voting with its jobs, and companies seem to be saying that the potential is worth the gamble. Blockchain has become a line of business for a whos who of the corporate world IBM, Oracle, JPMorgan Chase, Microsoft (LinkedIns parent company), Amazon, and American Express, to name just a few. Blockchain is now being used in industries ranging from shipping to healthcare, from farming and food safety to entertainment and gaming.

As CoinGeek reported, while the demand for blockchain skills has continued to skyrocket, the supply has waned. This is despite blockchain jobs having higher pay, with those in the U.S. offering twice the national average. In its Emerging Jobs Report 2020, LinkedIn revealed that blockchain developers were no longer on their list of top 15 emerging jobs. An earlier report by Indeed also found that searches related to blockchain have been on a decline for the past two years. In 2019, these searches went down 53%. In stark contrast, Indeeds portal saw a steady increase in job postings for blockchain-related roles.

The Genesis protocol upgrade on February 4, 2020 is a monumental step in the history of Bitcoin, and will see BSV returned as close as possible to the original protocol as envisioned by Satoshi Nakamoto. Visit theGenesis Hard Fork pageto learn more.

To receive the latest CoinGeek.com news, special discounts on CoinGeek Conferences and other inside information direct to your inbox, pleasesign upfor our mailing list.

Go here to read the rest:
Blockchain is the top skill for 2020, LinkedIn says - CoinGeek

Read More..