Loading...

SEEBURGER Customer Advisory Board (CAB) Meeting in Hamburg, Germany – CAB member companies confirm our direction as enabler of Digital Change

18th April, 2017|Axel Haas

Since many years, SEEBURGER is getting guidance from key customers which are “power users” of our Business Integration Suite (BIS) platform. We review product development [...]

SEEBURGER Benelux Client Day report

10th April, 2017|Albert Weessies

Thursday, 23 March 2017, SEEBURGER Benelux organized their annual Client Day which took place at the Safari park De Beekse Bergen in the Netherlands. SEEBURGER [...]

Digital Business Solutions in 2017 – Transform and Roll Out!

23rd March, 2017|SEEBURGER Editors

Customers tell their stories! Digital transformation is all about integration and automation of processes, systems, machines, as well as interaction with people. SEEBURGER has successfully [...]

SEEBURGER products and services are not vulnerable to the Shellshock Security Vulnerability

The GNU Bash ("Bourne Again Shell", /bin/bash) is reported to have security vulnerabilities nicknamed "Shellshock" CVE-2014-6271. The Shell is installed and used on nearly all Linux, Unix and MacOS X systems. There are various attack vectors known, where the weakness of the bash shell can be exploited. Among those are also unauthenticated attacks against CGI-Scripts [...]

By | 14th April, 2014|

SEEBURGER not vulnerable to Heartbleed

Here is a short Q&A about SEEBURGER products and services in response to the recently announced security threat called Heartbleed: Are SEEBURGER products affected? No. SEEBURGER products are not directly affected by the Heartbleed Open SSL issue. But we do recommend that your company review any use of Open SSL to ensure your system's security. [...]

By | 14th April, 2014|

Onboarding: How to Capture Your ROI After the Deployment

by: John Applegate So you’ve done sufficient due diligence during the software acquisition to have confidence that the solution will meet your technical requirements and the solution has been deployed.  Now what?  Job #1 is to focus on meeting business objectives.  Here are three motivating factors that should drive your focus. Focus on Business Objectives [...]

By | 14th November, 2013|

BYOD Is Not Going Away—in fact, it’s going to explode.

Bring Your Own Device (BYOD) is basically an official, unofficial or unwanted policy of employees bringing their own mobile devices to work to use for work purposes. They use their devices to access confidential company applications, data and files. BYOD exposes companies to significant risk. But it also offers companies significant opportunities. As far as [...]

By | 17th October, 2013|

Taming TCO in the financial services industry

File transfer is more than a given at the average financial institution. The Financial Services Industry (FSI) thrives on information and devours it. In one day you might send and receive files in and out of the office, down the street and across the globe, and back and forth with agents, clients, brokers and more. [...]

By | 10th October, 2013|

SAPinsider article sheds light on supply chain troubleshooting

Things like locating a customer order or figuring out why it didn’t ship in an ERP or SAP system can be, well, pretty much a mess. It can take hours to answer simple questions, concerning customers, stalling supply chains, and costing a bundle in labor costs and missed SLA deadline penalties. A little Q&A will [...]

By | 4th October, 2013|

Online security in the financial services sector is a risky business

Imagine hundreds of billions of dollars vanishing right before your eyes. Well that’s exactly what happened yesterday when someone caused the stock market to temporarily crash by hacking into AP’s Twitter feed and tweeting about a White House bombing that never happened. Unfortunately, hacking, intrusions, phishing and Internet fraud are just some of the malicious [...]

By | 26th September, 2013|