RSS feed Get our RSS feed

News by Topic

deal volume

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: Jul 07, 2013
While the concept of big data is nothing new, the tools and technology and now in place for companies of all types and sizes to take full advantage. Enterprises in industries such as media, entertainment, and research and development have long been dealing with data in large volumes and unstructured formats - data that changes in near real time. However, extracting meaning from this data has been prohibitive, often requiring custom-built, expensive technology. Now, thanks to advancements in storage and analytics, all organizations can leverage big data to gain the insight needed to make their businesses more agile, innovative, and competitive.
Tags : big data, emc, technology, storage, analytics, data management, security
     EMC Corporation
By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
     Juniper Networks
By: TIBCO Software APAC     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
     TIBCO Software APAC
By: Proofpoint     Published Date: Dec 21, 2018
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
     Proofpoint
By: Intralinks     Published Date: Oct 02, 2012
Trends in the market show that buyers are coming back, albeit with a far more selective and cautious approach following months of economic volatility.
Tags : marketing and advertising, research, deal flow, economics, deal volume, intralinks
     Intralinks
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
     netForensics
By: SWsoft     Published Date: Aug 21, 2009
Today's IT organizations are dealing with the consequences of exploring IT Infrastructure growth and complexity. With its growing complexity and volume, the cost of managing the infrastructure from simple patch management to skill sets requirements for IT administrators is increasing.
Tags : active directory, bandwidth management, convergence, swsoft, server virtualization, patch management, network management, infrastructure
     SWsoft
By: IBM     Published Date: Dec 03, 2008
Small and mid-sized businesses are dealing with larger volumes of data than ever before, but without the big enterprise budgets. What they need are budget-stretching solutions that reduce the complexities of data storage while being easy to use.
Tags : ibm, express seller, storage solutions, modular systems, ibm express advantage, ibm system storage, storage
     IBM
By: IBM     Published Date: Apr 06, 2015
Voice of the customer (VOC) is a market research technique defined as the process of capturing a customer's expectations, preferences and aversions. Ideally, Voice of the Customer analysis produces a detailed set of customer wants and needs that is prioritized by company objectives or strategic goals. What has changed significantly is the volume and number of data sources and channels, inclusive of mobile device, kiosk, POS and tablet that are able to feed into the analysis of contextual VOC information via enabling VOC software, services and technologies.
Tags : market research, new technique, market analysis, customer preferences, customer experience/engagement, business intelligence
     IBM
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics