RSS feed Get our RSS feed

News by Topic

intelligence

Results 351 - 375 of 1960Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: Feb 02, 2016
Read this report to gain more insights from the Telecoms.com Intelligence survey, and learn why telecommunications operators need analytics to understand their customers—and maintain their loyalty.
Tags : ibm. telecom, data, analytics, customer management, customer loyalty, crm & customer care
     IBM
By: IBM     Published Date: May 17, 2016
Is your data architecture up to the challenge of the big data era? Can it manage workload demands, handle hybrid cloud environments and keep up with performance requirements? Here are six reasons why changing your database can help you take advantage of data and analytics innovations. 
Tags : ibm, business analytics, business intelligence, data, analytics, database
     IBM
By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : customer analytics, data matching, big data, competitive advantage, customer loyalty
     IBM
By: Juniper Networks     Published Date: Feb 01, 2016
This new report from TechTarget identifies three specific challenges to overcome: Deploying an integrated suite of security services Closing the gap between intelligence and enforcement Centralizing visibility and management
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Feb 01, 2016
Juniper’s integrated security solutions are known for successfully protecting some of the world’s most demanding mission-critical environments, based on four core criteria from TechTarget: Breadth of capabilities in one solution Mission-critical performance and reliability Threat intelligence: open source and expertise
Tags : 
     Juniper Networks
By: Oracle     Published Date: Mar 29, 2017
We staan aan de vooravond van een technologische revolutie waarbij innovaties zoals Artificial Intelligence en Virtual Reality de customer experience zullen hervormen. Merken raken beter ingespeeld op digitale klanten die steeds meer de voorkeur geven aan self-service boven menselijke interactie. Aan de andere kant blijkt ook dat vele merken nog steeds worstelen met een van de meest fundamentele basisvereisten digitale CX: een optimale data-strategie.
Tags : 
     Oracle
By: Oracle     Published Date: Apr 13, 2017
For hospitality leaders, anticipating consumer trends and seeking innovations that enhance guest experiences are vital exercises that need to be practiced diligently. Now, more than ever – with the coming wave of disruptive technologies – taking these steps helps ensure success tomorrow.
Tags : hospitality, artificial intelligence, facial recognition, customer experience, restaurants, 3d printing
     Oracle
By: IBM     Published Date: Jul 19, 2016
This video demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions. The solution leverages advanced predictive models to analyze customer transactions and spending behavior to more deeply understand customer needs and propensities, anticipate life events, and help provide a unique customer experience.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics
     IBM
By: IBM     Published Date: Jul 19, 2016
Learn new ways of analyzing digitally connected customers-from dynamic segmentation to the use of advanced analytics. With predictive tools, banks can analyze transactions and spending behavior to better understand customer needs, anticipate life events, and provide a unique experience.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics
     IBM
By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : security. ibm, ibm i2, cyber-intelligence, fraud, malware
     IBM
By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : data security, threat intelligence, security operations, advanced security analysts
     IBM
By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : cyber threat, cyber defenses, security intelligence, malware discovery, security
     Kaspersky Lab
By: Taleo     Published Date: Apr 11, 2011
Get insight on top performers, where they're coming from, strategies to build the next generation of leaders, and more.
Tags : talent intelligence, taleo, workforce data, workforce development, data collection, talent insight, talent database
     Taleo
By: EMC Corporation     Published Date: Jul 07, 2013
Forward-looking enterprises know there's more to big data than strong and managing large volumes of information. Big data presents an opportunity to leverage analytics and experiment with all available data to derive value never before possible with traditional business intelligence and data warehouse platforms. Through a modern, big data platform that facilitates self-service and collaborative analytics across all data, organizations become more agile and are able to innovate in new ways.
Tags : enterprises, storage, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: EMC Corporation     Published Date: Jul 07, 2013
Competitive enterprises that embark on big data strategies do so with the expectation that their businesses will transform. They don't just want answers from the data they collect and analyze, they want results. Be it with small, fledgling trials or large, cross-functional efforts, these enterprises want to see clearly how big data can make a difference - with their customers, their processes, their bottom lines and, most important, with growing the business.
Tags : storage, enterprises, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: TimeTrade Systems Inc.     Published Date: Apr 21, 2011
Business-to-business CMOs need to stay current on emerging technologies that improve customer engagement. This Forrester Research report overviews new technologies marketers us to improve customer acquisition and engagement at different stages of the customer life cycle.
Tags : b2b marketing, marketing tools, lead generation, marketing technology, website conversion, timetrade, forrester, jeff ernst
     TimeTrade Systems Inc.
By: Blue Coat Systems     Published Date: Jul 05, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making. You'll see how Blue Coat WAN Optimization leverages proven solutions to achieve dramatic reductions in latency and bandwidth consumption.
Tags : blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver
     Blue Coat Systems
By: SAP     Published Date: Dec 08, 2011
Register to view an on demand video presentation and learn how to leverage powerful business intelligence and performance management software for the midmarket with valuable tips and access to more in depth information.
Tags : sap, kit-digital, webinar, technology, business intelligence, software management, reporting, dashboards
     SAP
By: Esker     Published Date: Feb 03, 2017
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, Addressing Manual Order Management, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: Make every order electronic Allow customers to send fax/emails Increase speed, visibility & accuracy Eliminate manual data entry Manage growth without adding staff
Tags : best practices, business optimization, business management, productivity, business intelligence, business process automation, business process management
     Esker
By: Esker     Published Date: Feb 03, 2017
The overall success and competitiveness of a company can be directly tied to the efficiency of its order management process. If you’re fed up with the low visibility, high costs, and inefficiency of fax, email and EDI order processing, here are 9 reasons why order processing automation in an SAP environment is a brilliant business move for your company. Learn more about Order Processing Automation — download the guidebook today!
Tags : best practices, business optimization, business management, productivity, business intelligence, business process automation
     Esker
By: Esker     Published Date: Feb 03, 2017
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: Automate fax, email, EDI, and other orders into SAP applications Eliminate the cost and errors of manual order processing Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : sales, solutions, best practices, business process, business management, business intelligence
     Esker
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics