data potential

Results 126 - 150 of 220Sort Results By: Published Date | Title | Company Name

Don’t bolt on your data center security after the fact. Build it in for comprehensive protection.

Published By: McAfee     Published Date: Feb 06, 2013
By building in comprehensive security measures at the design and architectural phase of data center build-outs, organizations can optimize business-critical service availability and minimize potential downtime.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines, virtualization, infrastructure, infrastructure management
    
McAfee

Easy-to-Apply Virtual Patches Protect Sensitive Databases from Potential Breaches

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention
    
McAfee

HP Haven: See the big picture in Big Data - Know your customers better with targeted merchandise

Published By: HP     Published Date: Jan 20, 2015
There are many new ways Big Data analytics can significantly boost marketing and promotional efforts through real-time and historical analysis of online data, such as clickstream or purchase transactions. Unstructured data based on social media—even photos and video—offers enormous potential when analyzed with the right tools.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

Using Secure IoT to Drive Business Growth

Published By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software

6 Talent Data Insights You Can't Live Without

Published By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, you'll learn how to: -Increase hiring velocity for high-demand talent -Create stronger recruiting teams -Find and engage the right agencies The six data points in this e-book are critical to unlocking the full potential of direct hire agencies in order to land those highly sought-after job candidates. Commanding this data will also position your recruiting teams to become strategic advisors to your company and its business units.
Tags : 
direct hire agencies, headhunters, job candidates, recruiting teams, recruitment
    
Bounty Jobs

SANS Reviews LogRhythm CloudAI for UEBA

Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm

Why Graph?

Published By: Datastax     Published Date: Apr 04, 2017
Graph databases are changing how we use data. But first, an example – you're (probably) a human working on a project and looking at graph databases as a potential solution. While we're a company that has a graph database that hopefully solves your problem. Now we could store that data in a boring relational database, but how do we do more than that? For instance, using that data, when combined with other data points, to find other people like you and recommend our solution to them? This is where a graph can come in handy. The friendly graph data model makes it easy to use patterns of relationships within large data sets. By leveraging those relationships we can analyze, or create better real-time experiences. Why Graph explores why this graph database 'thing' is really a thing, how they compare to other database systems, and the use cases they best support.
Tags : 
graph, database, datastax
    
Datastax

Modernizing Mission-Critical Applications for the Public Sector

Published By: Datastax     Published Date: Aug 07, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
    
Datastax

Reduce Complexity in the Data Center with the Right Architecture

Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

Beyond Hadoop: Modern Cloud Data Warehousing

Published By: Snowflake     Published Date: Jan 25, 2018
Compared with implementing and managing Hadoop (a traditional on-premises data warehouse) a data warehouse built for the cloud can deliver a multitude of unique benefits. The question is, can enterprises get the processing potential of Hadoop and the best of traditional data warehousing, and still benefit from related emerging technologies? Read this eBook to see how modern cloud data warehousing presents a dramatically simpler but more power approach than both Hadoop and traditional on-premises or “cloud-washed” data warehouse solutions.
Tags : 
    
Snowflake

Modern Enterprise Data Protection

Published By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
    
Cloudian

Eight Storage Requirements for AI and Machine Learning

Published By: Cloudian     Published Date: Apr 26, 2018
Data is the life-blood of artificial intelligence and machine learning (AI and ML). Vast quantities of training data enhance accuracy in the search for potentially predictive relationships.
Tags : 
    
Cloudian

How To Power Your Go-To-Market Strategy with Fire

Published By: EverString     Published Date: Jul 27, 2018
You have lots of leads, but finding the right match is getting harder and harder. You know the good leads are out there. They might even be looking for you. The trouble is, those good leads are hidden among so many bad ones. Your sales and marketing teams know this. They’re facing a deluge of data, not all of it reliable, and they’re trying to decode that data using outdated point solutions and imperfect criteria. Which means a lot of time spent running campaigns, initiating conversations and booking meetings that go nowhere. If this were the dating world, we’d be talking about a calendar full of bad first dates. Everyone’s “swiping right,” but no one’s truly matching. No one’s getting a second date. No one’s committing. Something just isn’t working. We can’t help you if you’re dating. But if you’re trying to sell your company’s products and services—well, the game is about to change. Instead of moving through a volume of potential customers as quickly as possible to build pipeline, th
Tags : 
    
EverString

Gartner - The Edge Completes the Cloud

Published By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
    
Equinix APAC

Extending the Reach of Your Business Intelligence Insight through a Single, Complementary Solution

Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‐makers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‐process changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized, analyzed, visualized, mapped, database, gis, geographic business intelligence, data independence, etl, csv, delimited text file, mdb (both for microsoft access, esri personal geodatabase
    
SRC,LLC

DLP for Tablets

Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, business technology, data center
    
CDW Symantec

Ultra-Fast Data Access Is The Key To Unleashing Full Big Data Potential

Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Accessing, analyzing, and actioning with big data are among the key challenges facing every enterprise. In this detailed report from Forrester, you’ll see key drivers and challenges with Big Data, AND some clear recommendations on how to proceed. Get the white paper to see Forrester's key findings.
Tags : 
data, storage, big data, enterprises, technology, database development, data integration
    
Lenovo and Intel®

10 Tips on How to Audit Your Marketing Data Flow to Unleash its Full Potential

Published By: Simba by Magnitude     Published Date: Sep 20, 2019
Despite the thousands of MarTech solutionsavailable today, we’re stillmissing a comprehensive, connected view of our marketing data.Imagine if we could connect the dots.You know you don’t have the fully integrated picture of your marketing data, but how do you troubleshoot, whom and what should you ask?Here’s a check listof questions and exercises to help you discover your data and process bottlenecks. Are you ready?
Tags : 
    
Simba by Magnitude

Maximize Your Business Value of Data with NexGen Architecture

Published By: NexGen     Published Date: Feb 09, 2015
94% of IT professionals consider it valuable to manage data based upon the business value of it. Yet only 32% are doing it - because it's hard. Are you looking to be a part of the 32% without the difficulties? There is a substantial gap between those who want to use data to its full potential and those that are actually doing so. Storage systems have never been designed with the end-goal to help customers prioritize their data based on their own priorities and the value of that data. Narrowing that gap may not be as hard or expensive as many companies think. Solving these challenges was one of the founding principles around NexGen's Hybrid Flash Array. Download now and learn how IT professionals can use NexGen storage architecture and software to simplify data priority assignment and management process.
Tags : 
data, data value, nexgen, flash, hybrid, it management
    
NexGen

Steganography: Secret Files Lurking Inside Photos and Music

Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET

How to Guard Healthcare Information with Device Control and Data Encryption

Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance, access control, application security, auditing, encryption, firewalls, internet security, intrusion prevention, best practices, data protection, database security
    
Lumension

Digital Data Distribution Platforms in Action

Published By: Tealium     Published Date: Mar 12, 2014
In this paper, Web Analytics Demystified presents an approach towards big data that has the potential to simplify the quest for “whole customer” data and improve your company’s odds of success.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, marketing, marketing optimization, web analytics, analytical applications, business intelligence, business technology
    
Tealium

Tapping into Unleashed Business Potential with Advanced Analytics

Published By: Netezza IBM US     Published Date: Mar 27, 2012
This powerful, high-performance, scalable, simple-to-use advanced analytics platform delivered with every IBM Netezza data warehouse appliance, delivers on the promise of tapping into unleashed business potential.
Tags : 
technology, ibm, netezza, advanced analytics, enterprise, business analytics, optimization, application integration, application performance management, analytical applications, business intelligence, business technology
    
Netezza IBM US

Using Data Mining to Detect Insurance Fraud

Published By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, it management, data management, data center
    
IBM

Revealing Security Performance Metrics Across Major World Economies

Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices, risk management, security, enterprise applications, business technology
    
BitSight Technologies
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.