RSS feed Get our RSS feed

News by Topic

data intelligence

Results 1 - 25 of 587Sort Results By: Published Date | Title | Company Name
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
     Aberdeen
By: Aberdeen Group     Published Date: Jun 02, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
     Aberdeen Group
By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeen’s Content Marketing survey revealed that while 95% of marketers are using or considering using a content marketing strategy, there are some distinct differences between those using content well and those just using content. The Best-in-Class are not only creating content at volume, they are taking a much more data-driven approach to their content marketing strategy — and it’s paying off. Find out how.
Tags : customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing
     Aberdeen Group
By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeen’s research shows that 90% of Best-in-Class marketers report fueling lead generation efforts with content marketing. What do you need to know to follow this best practice of the Best-in-Class? That’s exactly what this Knowledge Brief is intended to uncover.
Tags : customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing
     Aberdeen Group
By: Aberdeen Group     Published Date: Nov 13, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing
     Aberdeen Group
By: Aberdeen Group     Published Date: Nov 23, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing
     Aberdeen Group
By: Adobe     Published Date: Sep 04, 2014
The rapid growth of mobile impacts all facets of your business. Econsultancy surveyed 600 client-side and agency marketers to provide data and insights in their Quarterly Digital Intelligence Briefing: Finding the Path to Mobile Maturity report, giving marketers a benchmark to judge their own mobile activities.
Tags : mobile impacts, mobile insight, mobile trends, mobile activities, emerging marketing, business intelligence, market research, usability
     Adobe
By: Adobe     Published Date: May 15, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
     Adobe
By: Adobe     Published Date: May 15, 2018
Adobe is the only Leader in Digital Intelligence Platforms. Digital intelligence with scope and depth. Your customers come to you from different places, so your data insights should do the same thing. Adobe Experience Cloud’s digital marking and analytics solutions help you combine insights from existing, new, and emerging channels. Read the Forrester Wave™: Digital Intelligence Platforms, Q2 2017 to find out why we stand alone among DI platform vendors.
Tags : 
     Adobe
By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
     Adobe
By: Adobe     Published Date: May 04, 2018
Adobe is the only Leader in Digital Intelligence Platforms. Digital intelligence with scope and depth. Your customers come to you from different places, so your data insights should do the same thing. Adobe Experience Cloud’s digital marking and analytics solutions help you combine insights from existing, new, and emerging channels. Read the Forrester Wave™: Digital Intelligence Platforms, Q2 2017 to find out why we stand alone among DI platform vendors.
Tags : 
     Adobe
By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
     Adverity
By: Adverity     Published Date: Jun 15, 2018
In this whitepaper, we take a closer look at some of the biggest challenges facing e-commerce businesses, namely understanding your data in general and, more precisely, your customer acquisition costs (CAC). It's full of inspiration, useful tips and actionable insights for you to step up your marketing game. In order to reap the fruits from your data seeds, you have to make sure you tackle these five challenges full-frontal: Knowing what data to capture Understanding customer behaviour Finding your technology solution Ensuring analysis is impartial Optimising website content - especially for your offline users
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
     Adverity
By: Adverity     Published Date: Jun 15, 2018
Master Your Client's Data To Build An Advertising Agency For The Future This is the first part of our ebook Strategic Playbook For Data-driven Advertising Agencies. In this instalment we cover how agency executives can benefit from their client's data to maintain a sustainable, future-proof business in times of digital transformation. Scaling your business with Marketing Intelligence Building a data strategy to stay ahead of the curve Mastering the end-to-end data management process Once you decide to master your data, you will be rewarded with deep, meaningful insights and happy long-term clients that get the most out of their data. We know it’s worth it! Signup and download the 28-page pdf-document to understand how data will secure your spot in the future advertising industry.
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
     Adverity
By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence
     Advizex
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
     Akamai Technologies
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics