it analytics

Results 526 - 550 of 1904Sort Results By: Published Date | Title | Company Name

Enterprise Storage Group White Paper: THE BIG DATA SECURITY ANALYTICS ERA IS HERE

Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

Security Innovation Council Report: TRANSFORMING SECURITY: DESIGNING A STATE-OF-THE-ART EXTENDED TEA

Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

Building an Intelligence Driven Security Operations Center

Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

Taking Charge of Security in a Hyperconnected World

Published By: EMC Corporation     Published Date: May 27, 2014
RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

The Critical Incident Response Maturity Journey

Published By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

Defend your Enterprise: Be the Hunter

Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation

Don't Play Fair When it Comes to Cyber Attacks

Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation

Cyber Threats: Are you the Hunter or the Hunted?

Published By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : 
cyber attacks, virtual, security, analytics, ecat
    
EMC Corporation

Identify and Prioritize Incidents without Sifting through Logs

Published By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation

See Everything That's Happening on Your Network and Endpoints

Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation

Selecting the Right Identity Governance Solution

Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics, identity management
    
SailPoint

Embedded Analytics Vendor Selection Guide

Published By: Pentaho     Published Date: Aug 22, 2016
This white paper covers six guidelines product leaders should explore during their embedded analytics evaluation.
Tags : 
big data, data integration, bi systems, hadoop
    
Pentaho

Speed-to-Market: Implementing an E-Commerce Platform in Three Months

Published By: hybris software     Published Date: Aug 01, 2012
It's true that deploying B2B e-commerce platform involves many unique requirements not commonly found in B2C operations, such as incorporating a complex product port-folio, multiple distribution channels, and integrating with third party systems And yet, it's possible to complete an initial out-of-the-box B2B implementation within three months, if all the right critical path steps are followed. Additional features and functionality can be added after the initial launch, provided that the chosen out-of-the-box platform is designed to be used over the long run.
Tags : 
information technology, finance, analytics, maerchandising, product management, marketing, mapping, requirements gathering
    
hybris software

Gearing Up for Growth

Published By: Teradata     Published Date: Jun 12, 2013
In March of 2011, CFO Research Services conducted a survey among more than 200 senior finance executives primarily in the United States to explore how well companies' information systems are supporting finance executives' ongoing efforts to transform the finance function into a value-added partner to the business. Especially in the aftermath of a worldwide recession, do CFOs and their staffs have the information they need to deliver real business value throughout the organization? How well equipped are they to provide the kinds of critical and useful business analytics that can drive the company forward? Download this paper to learn the findings of our research.
Tags : 
financial analytics, teradata, it complexity
    
Teradata

Forrester Paper: Welcome To The Era of Digital Intelligence

Published By: Teradata     Published Date: Jun 12, 2013
Because subpar analytics put customer relationships at risk, Forrester is redefining the modern practice of web analytics as "digital intelligence." This new approach to analytics brings a set of expanded requirements and calls on firms to consider their technology frameworks, organizational structures, metrics, and optimization practices.
Tags : 
web analytics, data driven marketing, digital intelligence
    
Teradata

Teradata Unified Data Architecture

Published By: Teradata     Published Date: Jun 12, 2013
Until now, huge amounts of data have been ignored or underutilized simply because the tools didn't exist to make sense of it all. The good news is that increasingly sophisticated software is combining with growing computing horsepower to produce new analytics platforms that can handle all types of data from disparate systems Organizations can extract intelligence from their data to significantly outperform their rivals on growth, earnings, and performance.
Tags : 
unified data architecture, big data, analytics
    
Teradata

The Top Five Myths of Big Data Analytics

Published By: Teradata     Published Date: Jun 12, 2013
This paper takes a look at the hard truths and common misconceptions surrounding big data. In particular, it focuses on five common myths about large-scale analytics, athen offers a glimpse at the next steps necessary to make big data work for you.
Tags : 
big data, big data analytics, data driven marketing
    
Teradata

Turning Data Into Profit with Teradata Unified Data Architecture

Published By: Teradata     Published Date: Jun 12, 2013
Download this paper to learn how Unified Data Architecture™ can bridge the gap between the business language of SQL, the extreme processing power of MapReduce, and the big data residing in Hadoop to provide a unified, high-performance big data analytics system for the enterprise.
Tags : 
data, big data, unified data architecture
    
Teradata

Healthcare's Future Depends on Data-Driven Insights Into Individual Behavior

Published By: Teradata     Published Date: Jun 12, 2013
Health plans and insurers know that to thrive over the next 3-5 years, they must dramatically improve their ability to engage with individual consumers. The combination of Teradata products; an integrated data warehouse, Aster big data analytics and Aprimo integrated communication management, creates actionable analytic capabilities unparalleled in its ability to help companies achieve these goals. this white paper details how health plans and insurers can use Teradata to succeed in today’s healthcare environment.
Tags : 
healthcare, data, insights, health plans, integrated data
    
Teradata

The Top Three Components to Selling and Renewing Insurance Policies

Published By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : 
insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
    
Teradata

THRIVING IN THE DIGITAL AGE: A Guide for Modern Finance Leaders

Published By: Oracle     Published Date: Sep 21, 2016
This white paper shows how to use your big data analytics and smooth procurement systems as a launchpad to holding your own in the Digital Age.
Tags : 
    
Oracle

Using Technology to Ease Change Management in Healthcare Organizations

Published By: Oracle     Published Date: Jul 31, 2017
Consolidation in the healthcare industry has reached a record pace. The volume of organizational change has generated solid templates and best practices for change management. In addition, technological advances provide opportunities for sophisticated data analytics and systems integrations. By identifying and taking advantage of these technologies, healthcare organizations can increase the odds of successful integrations that result in greater agility decrease their cost base, and improve the quality of care they provide.
Tags : 
    
Oracle

Enterprise Strategy Group Report: The Big Data Security Analytics Era is Here

Published By: RSA Security     Published Date: Oct 24, 2013
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
rsa, emc, enterprise strategy, big data, security, security analytics
    
RSA Security

A Roadmap for Big Data in Security Analytics

Published By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
rsa, emc, big data, security, security analytics, scale, security management
    
RSA Security

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats

Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics, security
    
RSA Security
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.