RSS feed Get our RSS feed

News by Topic

intelligence

Results 1951 - 1975 of 1985Sort Results By: Published Date | Title | Company Name
By: Epicor Software Corporation     Published Date: Mar 21, 2017
Download Epicor BisTrack News and find out how you can best position your distribution company for profitable growth.
Tags : erp, erp system, enterprise resource planning, business system, epicor bistrack, distribution software, business intelligence, builders merchants
     Epicor Software Corporation
By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
     IBM
By: IBM     Published Date: Jan 11, 2017
Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence - Needing a well trained cybersecurity force
Tags : ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
     IBM
By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
     IBM
By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
     IBM
By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
     Lookout
By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
     Comcast Business
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx
     Juniper Networks
By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: Kronos     Published Date: Sep 20, 2018
If you’ve tried managing your retail operation’s labor performance without reliable, real-time data, you know the costly shortcomings of this approach. Tap into clear, easy-to-access workforce data — a single view of all elements of your workforce that empowers you to make effective decisions and protect your bottom line. Workforce Analytics for Retail transforms labor and sales data into meaningful business intelligence. Learn how managers can make data-driven decisions that optimize workforce utilization, control labor costs, and drive continuous improvement.
Tags : 
     Kronos
By: Pure Storage     Published Date: Apr 18, 2018
Massive amounts of data are being created driven by billions of sensors all around us such as cameras, smart phones, cars as well as the large amounts of data across enterprises, education systems and organizations. In the age of big data, artificial intelligence (AI), machine learning and deep learning deliver unprecedented insights in the massive amounts of data. Amazon CEO Jeff Bezos spoke about the potential of artificial intelligence and machine learning at the 2017 Internet Association‘s annual gala in Washington, D.C., “It is a renaissance, it is a golden age,” Bezos said. “We are solving problems with machine learning and artificial intelligence that were in the realm of science fiction for the last several decades. Natural language understanding, machine vision problems, it really is an amazing renaissance.” Machine learning and AI is a horizontal enabling layer. It will empower and improve every business, every government organization, every philanthropy
Tags : 
     Pure Storage
By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
     Q2 eBanking
By: Google     Published Date: Dec 03, 2018
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential.
Tags : 
     Google
By: CA Technologies EMEA     Published Date: May 25, 2018
CA recently partnered with TechValidate to perform a research study that would help us to understand how organizations are leveraging our CA Project & Portfolio Management (CA PPM) solution to evolve their businesses. The study validated the changing role of the modern PMO.
Tags : tech, validate, research, study, portfolio, management
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 07, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
     CA Technologies EMEA
By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : malware, predictive, test, response
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : economic, cylance, roi, enterprises
     Cylance
By: Group M_IBM Q1'18     Published Date: Feb 14, 2018
Data science platforms are engines for creating machine-learning solutions. Innovation in this market focuses on cloud, Apache Spark, automation, collaboration and artificial-intelligence capabilities. We evaluate 16 vendors to help you make the best choice for your organization.
Tags : gartner, magic quadrant, data science platform, machine-learning
     Group M_IBM Q1'18
By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     IBM
By: Tricentis     Published Date: Jan 08, 2018
Data. It seems to be everywhere today and yet we can never get enough of it. But as it turns out, a lack of data isn’t our problem -- our problem is the difficulty piecing together, understanding and finding the story in all the data that’s in front of us. In software testing in particular, the need for consolidated, meaningful test metrics has never been higher. As both the pace of development and the cost of delivering poor quality software increase, we need these metrics to help us test smarter, better and faster. Fortunately, business intelligence now exists to make this goal a reality. The analytics these tools provide can help drive efficient and effective testing by providing teams with insight on everything from testing quality and coverage to velocity and more. And this knowledge can position the QA team as trusted experts to advise the entire software development team on steps that can ensure a better quality end result.
Tags : 
     Tricentis
By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : thousandeyes, network intelligence, business application, application performance management, cloud applications
     ThousandEyes
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics