Enterprise

Let the OSS Enterprise newsletter guide your open source journey! Sign up here. Databases are the cornerstone of most modern business applications, be it for managing payroll, tracking customer orders, or storing and retrieving just about any piece of business-critical information. With the right supplementary business intelligence (BI) tools, companies can derive all manner of insights from their vast swathes of
0 Comments
According to a new report by Cyara, despite the disparity in perceived digital transformation success, 94% of respondents overall believe digital transformation will have a positive impact on customer experience, yet only 7% of respondents say they have sufficient resources and budgets to meet implementation deadlines. Furthermore, IT decision-makers believe they are 4.71 months behind
0 Comments
According to a survey commissioned by Cyber Security Cloud Inc., 94% of respondents whose company experienced a cyberattack said it was preventable, almost 40% reported that the attack cost their company hundreds of thousands to tens of millions of dollars, and over half reported preventative cybersecurity spending to be from $100,000 to over $10 million.
0 Comments
Cyber-physical attacks against pharma supply chains are growing because attackers have figured out how to penetrate endpoint gaps between operations technology (OT) and IT systems. What makes these attacks so lethal is how they compromise the physical security of targets and immediately put the health of employees and patients at risk. Universal Healthcare Services says
0 Comments
AIOps startup Moogsoft has improved its unified cloud monitoring platform for enterprises with a host of new features, including integration with its observability service Datadog. The updates, according to a statement from the company, improve workflow automation and increase incident context, giving organizations using the platform a more holistic view of their systems as well
0 Comments
Enterprise deployment of AI and machine learning (ML) for cash flow forecasting is expected to increase 450% over the next two years, according to the recently released 2021 Cash Forecasting & Visibility Survey from GTreasury and Strategic Treasurer. The survey of nearly 250 enterprises across industries highlights a growing appetite for AI/ML modernization among finance
0 Comments
The move to hybrid work accelerated by the pandemic has created cybersecurity risks, with employees at home creating more possible vulnerable endpoints for enterprises. At the same time, enterprises are increasingly adopting cloud solutions like Microsoft’s Azure or Amazon’s AWS. This is creating hybrid cloud infrastructure gaps in enterprises. Also, hybrid work is driving the
0 Comments
Mountain View-based enterprise customer data platform (CDP) Treasure Data has just received a $234 million funding in what the company calls the largest-ever single round for a CDP. With CDPs playing a critical role in the success of enterprise growth, marketing innovation, product development, and more, Treasure Data says its platform allows marketing, service, and
0 Comments
SecureAuth, a provider of identity and access management solutions for cloud, hybrid, and on-premise environments, today announced it has acquired passwordless authentication startup Acceptto. The terms of the deal remain undisclosed. Founded out of Portland in 2013, Acceptto offers a solution for “continuous passwordless authentication.” The company says its eGuardian platform can calculate whether an
0 Comments
This article was contributed by Todd Blaschka, Chief Operating Officer at TigerGraph COVID-19 accelerated digital transformation among businesses and revolutionized ecommerce as we all adjusted to fluctuating lockdowns and quarantine mandates. The U.S. ecommerce market experienced ten years’ worth of growth in three months in early 2020 as consumers shopped almost exclusively online. COVID-19 created
0 Comments
Walmart will soon be enabling businesses across its vast global organization to design, build, and deploy their own voice and bot applications across multiple platforms for their specific audiences. The world’s largest retailer today announced plans to acquire technology assets of Botmock, a startup that has specialized software that makes it easy to build and
0 Comments
Everlaw, a cloud-native legal technology platform specializing in electronic discovery (ediscovery), has raised $202 million in a series D round of funding from a slew of high-profile investors including Alphabet’s Capital G. The Oakland, California-based company is now valued at more than $2 billion. Founded in 2010, Everlaw helps law firms, corporations, and government agencies
0 Comments
Velocity, a Tel Aviv-based company offering a cloud-powered, “production-like” environment for software developers, today announced that it raised $17 million in series A financing led by Insight Partners with participation from Hetz, Greycroft, and individual investors. The startup says that the proceeds will enable Velocity to create a U.S. office suite and expand its team,
0 Comments
According to a new survey by Entrust, only 31% of employees at enterprise companies report having received training on ransomware attacks. The survey found that the COVID-19 pandemic drove significant data security training efforts at hybrid workplaces around the world. The vast majority of enterprise business leaders who responded (81%) said their company had offered
0 Comments
This post was written by Amit Rosenzweig, CEO of Ottopia. Teleoperation: the technology that enables a human to remotely monitor, assist and even drive an autonomous vehicle. Teleoperation is a seemingly simple capability, yet it involves numerous technologies and systems in order to be implemented safely. In the first article of this series, we established
0 Comments
In the world of cybersecurity, speed kills. In less than 20 minutes, a skilled adversary can break into an organization’s network and start exfiltrating critical data assets, and as the volume of data modern companies produce increases, it’s becoming ever more difficult for human analysts to spot malicious activity until it’s too late. This is
0 Comments