RSS feed Get our RSS feed

News by Topic

enterprise intelligence

Results 101 - 125 of 175Sort Results By: Published Date | Title | Company Name
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: Enterprise Management Associates     Published Date: Aug 25, 2015
This webinar talks about various issues organization's deal with on a daily basis and how Hadoop can offer solutions.
Tags : ema, hadoop, big data analytics, predictive insights, data lake architecture, hadoop adoption, enterprise management, business intelligence
     Enterprise Management Associates
By: IBM     Published Date: May 19, 2015
Traditionally, business intelligence (BI) has looked backward at what has happened. In today’s marketplace, enterprises need to look ahead. From predictive to prescriptive intelligence, TDWI and IBM look at what businesses need most.
Tags : business intelligence, prescriptive intelligence, predictive analytics, immersive user experience, analytic technology, informative visualization
     IBM
By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data
     Cyveillance
By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
     Cisco
By: IBM     Published Date: Jan 26, 2015
IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.
Tags : analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security
     IBM
By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : big data, hp haven, scalable, secure data platform, ecosystem, security
     HP
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : oracle, srm, social media, social data, digital marketing
     Oracle Social Cloud
By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
     Datawatch
By: EMC Corporation     Published Date: Mar 20, 2014
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
     EMC Corporation
By: Arbor     Published Date: Mar 13, 2014
In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers
     Arbor
By: Oracle     Published Date: Feb 26, 2014
This white paper offers a brief overview of how organizations can make best use of social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer-experience-management systems in near real time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : oracle, srm, social, social data, enterprise, business intelligence, customer experience management, customer experience
     Oracle
By: Oracle     Published Date: Jan 16, 2014
In this whitepaper, you will learn the highlights of interviews with 229 executives worldwide and how they assess the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans.
Tags : creating sales territory, sales performance, sales plan development, sales data, sales territory, incentive compensation plan, enterprise communications, data versus instinct
     Oracle
By: Oracle     Published Date: Jan 16, 2014
In this whitepaper, you will learn the highlights of interviews with 229 executives worldwide and how they assess the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans.
Tags : creating sales territory, sales performance, sales plan development, sales data, sales territory, incentive compensation plan, enterprise communications, data versus instinct
     Oracle
By: Oracle     Published Date: Jan 16, 2014
In this whitepaper, you will learn the highlights of interviews with 229 executives worldwide and how they assess the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans.
Tags : creating sales territory, sales performance, sales plan development, sales data, sales territory, incentive compensation plan, enterprise communications, data versus instinct
     Oracle
By: RSA Security     Published Date: Oct 24, 2013
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : rsa, emc, threat, analytics, intelligence, threat detection, security
     RSA Security
By: IBM     Published Date: Sep 27, 2013
A spreadsheet-based approach to performance management won't meet the challenges facing growing midsize businesses. You need confidence in the information you're using for critical decision-making. Read this white paper to see how IBM® Cognos® Express can transform spreadsheet-only processes to create flexible and timely plans, budgets and forecasts.
Tags : ibm, ibm cognos express, ibm cognos enterprise, spreadsheets, data analysis, data entry, reporting, midsize companies
     IBM
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics