RSS feed Get our RSS feed

News by Topic

normalization

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
By: ServiceNow     Published Date: Mar 13, 2019
Itís nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: May 14, 2019
Itís nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : servicenow, software, asset, management, data, audits
     ServiceNow
By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
     McAfee
By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
     BMC ASEAN
By: Zilliant     Published Date: Apr 08, 2010
Read this paper to learn how one leading manufacturer overcame the challenges of pricing configured products by employing a powerful combination of normalization, scientific segmentation, and software technology.
Tags : zilliant, manufacturing, pricing configured products, normalization, scientific segmentation, software technology, list prices
     Zilliant
By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw
     McAfee
By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
     McAfee
By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
     Intel Security
By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
     FICO
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics