NTT DATA Services

Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …
NTT DATA Services enters strategic collaboration agreement with AWS
NTT DATA Services announced it has entered into a three-year, strategic collaboration agreement with Amazon Web Services, to deliver new products, services and solutions …

Organizational culture defines a successful cloud strategy
61% of organizations in the U.S. and Canada are committed to moving enterprise applications to the cloud as quickly as possible, but many struggle with challenges related to …
NTT DATA launches Nucleus, a cloud-based intelligent enterprise platform
NTT DATA announced the launch of its cloud-based intelligent enterprise platform, Nucleus, which brings together NTT DATA’s analytics, processes and operations into a single …

Most consumers don’t trust companies to keep personal information secure
High-profile security breaches and changing regulations have raised consumer concerns and pressured businesses, establishing 2018 as a landmark year in the data economy. …
NTT DATA and Pivotal to modernize businesses through cloud-native solutions
NTT DATA Services announced the company is collaborating with Pivotal Software. Together the companies will modernize businesses through Pivotal Cloud Foundry (PCF), a …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility