RSS feed Get our RSS feed

News by Topic

enterprise intelligence

Results 51 - 75 of 175Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Discover how HPE is responding to the massive growth in enterprise data with intelligent storage. Data helps enterprises find new ways to reach and serve customers to grow profitability, but only when it is available at the right place and the right time. The growing complexity of managing and securing data prevents businesses from gaining its full value. Hewlett Packard Enterprise delivers the world’s most intelligent storage for the hybrid cloud world by providing storage that is driven by artificial intelligence, built for the cloud, and delivered as a service.
Tags : 
     Hewlett Packard Enterprise
By: HP     Published Date: Aug 21, 2009
Read this whitepaper to learn why HP Integrity servers and HP enterprise storage, combined with SQL Server 2005, can create the critical Business Intelligence IT environment that Windows customers have been dreaming of.
Tags : hp integrity, storage, sql server, business intelligence, windows server, infrastructure
     HP
By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : big data, hp haven, scalable, secure data platform, ecosystem, security
     HP
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated
Tags : intel, deduplicated, storage, network
     HP and Intel® Xeon® processor
By: IBM     Published Date: Feb 08, 2008
As manufacturing goes global, initiatives to standardize processes and key performance measurements across the enterprise to unite the greater supply chain are emerging. The main catalyst? Driving down costs in response to customer and market pressures. However, mid-size companies in particular are driving performance improvements with a more proactive, strategic vision for improving performance than reactively responding to cost pressure.
Tags : scm, supply chain, manufacturing, manufacturer, bpm, business process, erp, enterprise resource planning
     IBM
By: IBM     Published Date: May 30, 2008
WinterCorp analyzes IBM's DB2 Warehouse and how it addresses twin challenges facing enterprises today: improving the value derived from the torrents of information processed every day, while lowering costs at the same time. Discover why WinterCorp believes the advances in data clustering strategies and intelligent software compression algorithms in IBM's Data Warehouse improves performance of business intelligence queries by radically reducing the I/O's needed to resolve them.
Tags : data warehousing, data management, database management, database administration, dba, business intelligence, ibm, leveraging information
     IBM
By: IBM     Published Date: Feb 22, 2012
Enterprise decision management and decision intelligence are fundamentally decision-centric approaches. Organizations wishing to use them to become decision-centric should take a number of steps.
Tags : technology, decision management solutions, decision-centric, it management, business solutions
     IBM
By: IBM     Published Date: Dec 17, 2012
This seminar will show you how next-generation solutions are solving the "big data" challenge, and are providing enterprises with the visibility and analysis they need to move from post-incident forensics to pro-active and fraud intelligence.
Tags : ibm, big data, government, data management, visibility, business intelligence
     IBM
By: IBM     Published Date: May 02, 2013
The enormous volume, velocity and variety of data flooding the enterprise, along with the push for analytics and business intelligence, is creating a massive challenge that is overwhelming traditional storage approaches. As the demand for capacity continues to escalate, companies must be able to effectively and dynamically manage the storage supply, but also the demand for storage resources. The key is to optimize the infrastructure through standardization and virtualization, and replace manual tasks with policy-based automation.
Tags : optimize, storage, efficient, data center, analytics, business, virtualization
     IBM
By: IBM     Published Date: Jul 12, 2012
Today's technology landscape is transforming the concepts of business IT prevalent only just a few short years ago. With this transformation, however, has also come an equivalent transformation of risks.
Tags : enterprise security, ema, ibm, security, intelligence
     IBM
By: IBM     Published Date: Sep 27, 2013
A spreadsheet-based approach to performance management won't meet the challenges facing growing midsize businesses. You need confidence in the information you're using for critical decision-making. Read this white paper to see how IBM® Cognos® Express can transform spreadsheet-only processes to create flexible and timely plans, budgets and forecasts.
Tags : ibm, ibm cognos express, ibm cognos enterprise, spreadsheets, data analysis, data entry, reporting, midsize companies
     IBM
By: IBM     Published Date: Jan 26, 2015
IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.
Tags : analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security
     IBM
By: IBM     Published Date: May 19, 2015
Traditionally, business intelligence (BI) has looked backward at what has happened. In today’s marketplace, enterprises need to look ahead. From predictive to prescriptive intelligence, TDWI and IBM look at what businesses need most.
Tags : business intelligence, prescriptive intelligence, predictive analytics, immersive user experience, analytic technology, informative visualization
     IBM
By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management, security
     IBM
By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security
     IBM
By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security
     IBM
By: IBM     Published Date: Oct 06, 2016
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.
Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation
     IBM
By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : cyber security, threats, enterprise insight analysis, data computation, intelligence
     IBM
By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
     IBM
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : security. ibm, ibm i2, cyber-intelligence, fraud, malware
     IBM
By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : scalability, data warehousing, resource planning
     IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics