You've requested...

Share this with your colleagues:

Case study: Sicoob avoids USD 1.5 million in annual costs with IBM

If a new window did not open, click here to view this asset.

Download this next:

How 1 credit union overcame WAN limitations

Bethpage Federal Credit Union needed to increase WAN resiliency and available bandwidth to improve application performance across broad geographies, and enable greater agility to open new branch offices quickly as new market opportunities emerge.

The credit union decided to deploy Silver Peak’s EdgeConnect SD-WAN edge platform at all 32 branch locations, as well as two corporate sites and a remote data center.

Read this case study to review benefits Bethpage has experienced since SD-WAN implementation.

These are also closely related to: "Case study: Sicoob avoids USD 1.5 million in annual costs with IBM"

  • Clients tell-all in Linux simplification and innovation for enterprises

    Leading companies are seizing the opportunity to build and support the next generation of applications to drive competitive differentiation. Many of these self-same organizations utilize Linux to deliver revenue-driving applications that serve millions of customers, clients, and citizens.

    However, it is imperative that these applications are fully supported by enterprise-grade capabilities such as nondisruptive scalability, unparalleled availability, and continuous data protection.

    In this e-book, discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

  • SOC-as-a-service: Bay Federal Credit Union's exceptional results

    In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various managed detection and response (MDR) alternatives before deciding to use AWN CyberSOC Services.

    The credit union had a very positive experience and saw exceptional results in a short amount of time. The results the IT team saw included the following:

    • Immediately discovering a potential phishing attack that could have compromised corporate credentials
    • Receiving prompt notification of potential unauthorized events
    • Employing reporting features that help maintain an optimal security and compliance posture

Find more content like what you just read:

  • How banks can leverage threat detection and response services

    Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.

    Download

  • Differentiating your business in crowded sectors: Personalization

    Desiring competitive differentiation within the crowded financial services sector, many current credit union leaders are realizing that personalized customer experience (CX) is an absolute necessity. Read this white paper for 4 steps toward delivering a stand-out, personalized CX for your customers—and where to find additional help, if you need it.

    Download

  • Data Protection Masterclass: Global Privacy

    This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.

    Download

  • How this sanitation company kept their service desk squeaky clean

    In this case study, find out how BRK, a leading sanitation company in serving over 15 million customers, deployed a new service management platform to keep their service desk up to task.

    Download

  • How to simplify compliance for FFIEC-NCUA

    Find out how financial organizations can simplify FFIEC/NCUA compliance by leveraging a security operations center as a service (SOCaaS).

    Download

  • Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?

    The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.

    Download

  • How FNV unified 4 legacy network infrastructures

    In this case study, find out how FNV, the Netherland's largest trade union, unified and modernized 4 aging network infrastructures to create a high performance, wireless networking environment for their users.

    Download

  • The state of email trust in 2014

    Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.

    Download

  • GDPR: The State of Play

    An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.

    Download

  • Using mobile phones to manage mobile workers’ expenses

    The tool of choice to the highly mobile workforce is the  mobile phone. From customer contact and records keeping, through calendaring and scheduling to mapping and news feeds, the  mobile phone is usurping the laptop as the main point of technology for the road warrior.

    Download

  • Brexit and UK tech: Essential guide

    In the immediate aftermath of the UK's historic referendum vote to leave the European Union, Computer Weekly canvassed the advice and opinion of experts across the technology sector to assess the implications for IT professionals.

    Download

  • The application security State of the Union

    Organizations that invest in DevSecOps see reduced risk, lower costs, and a better time-to-market. Looking for the stats? In this webinar, WhiteHat delivers the application security “state of the union,” breaking down the latest security statistics. Catch up and listen now.

    Download

  • Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

    Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals.

    Download

  • The APAC Guide to Data Protection & GDPR

    In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.

    Download

  • Clients tell-all in Linux simplification and innovation for enterprises

    In this e-book, you will discover how to optimize server reliability, uptime, and IT manageability (and meet your SLAs) using an enterprise-grade Linux platform. Read on to ensure your business receives the processing power it needs to address increasingly sophisticated and demanding application requirements.

    Download

  • PCI compliance in the cloud: Can cloud service providers manage PCI?

    Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.

    Download

  • CW Middle East July to Sept 2017

    In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.

    Download

  • CW+: Mobile payments market opportunities for business

    The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • Phishing fraud: A Dr. Seuss storybook

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

    Download

  • Phishing fraud: A Dr. Seuss storybook

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

    Download

  • CW+: Bloor Research - EU Compliance and Regulations for the IT Professional

    This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.

    Download

  • EU data protection: Essential guide

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

    Download

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

    Download

  • 4 benefits when migrating with Red Hat

    When it wanted to adopt an enterprise-ready solution, CTO turned to Red Hat Enterprise Linux and Red Hat Virtualization, supported by Red Hat Satellite and Red Hat Insights management tools. Access this case study to learn the 4 major benefits CTOS experienced when implementing Red Hat.

    Download

  • Computer Weekly – 20 March 2018: Where neuroscience meets technology

    In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.

    Download

  • Computer Weekly – 11 September 2018: Retailers buy into AI – the rise of artificial intelligence in retail

    In this week's Computer Weekly, we talk to leading high street and online retailers to find out how they are using AI to get more from their customer data. New research suggests outsourcing is bad for software development – we assess the issues. And we look at how to ensure data protection when using containers. Read the issue now.

    Download

  • Case study: Finding a more flexible cloud communications provider

    Finding a service that was flexible and easy to use as well as able to make a difference in the lives of their customers, CESI partnered up with Nextiva. In this case study, learn how switching to Nextiva helped them.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • MicroScope – November 2019: The growing SD-WAN opportunity

    After plenty of hype, SD-WAN technology is delivering revenues for the channel as it continues to rapidly grow

    Download

  • Explore customer authentication regulations for banking

    In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • The unlikely origins of online banking

    Bryan Johnston, former CEO of TSB Northern Ireland, tells the story behind the bank's development of the first online real-time banking system in Europe.

    Download

  • CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?

    Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.

    Download

  • Spotlight on Benelux: A smart future

    A guide to choosing green computing for your IT department. Learn how and why you should consider improving energy efficiency techniques within your business.

    Download

  • Extracting actionable data from banking malware

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

    Download

  • Computer Weekly buyer's guide to fintech

    In this 14-page buyer's guide, Computer Weekly weighs up thecompetition from tech-based challenger banks, the importanceof customer experience and the value of leaving conventionalbanking in the past.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • Sharing knowledge to tackle online banking fraud

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

    Download

  • Case study: MidSouth Bank¿s experience with Silver Peak¿s EdgeConnect platform

    In order to support their growth and innovation strategy, MidSouth Bank is rolling out the Silver Peak EdgeConnect SD-WAN edge platform to all of its 42 locations, decommissioning MPLS and replacing it with DIA and commercial broadband links. In this case study, learn more about MidSouth Bank’s experience deploying Silver Peak Unity EdgeConnect.

    Download

  • The Global Information Technology Report 2013

    This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.

    Download

  • Mobile banking strategies - maximise your revenues

    Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.

    Download

  • Mobile Payments Using Host Card Emulation with NFC

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

    Download

  • How to buy IT training programs without breaking the bank

    Save a copy of this guide to learn how to strategically budget and buy training and development programs for your organization, including how to purchase training with vendor credits, take advantage of prepay plans, tuition reimbursements, and more.

    Download

  • CW Europe – September-November 2017

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

    Download

  • Why Citizens Business Bank decided to implement the Silver Peak VX-6000 software

    When Citizens Business Bank needed to fulfill a disaster recovery initiative, virtual WAN optimization software was the logical choice. In this case study, learn why Citizens Business Bank decided to implement the Silver Peak VX-6000 software.

    Download