network intelligence

Results 101 - 120 of 120Sort Results By: Published Date | Title | Company Name

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

An Incident Response Playbook: From Monitoring to Operations

Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Vulnerability Management: What you Need to Know to Prioritize Risk

Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

10 Steps to Application and Network Performance Nirvana

Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed

Tech Trends 2019 InfoGraphic

Published By: Comcast Business     Published Date: Feb 06, 2019
Just like your business, technology never stops advancing. Each year, there are new ways that technology can automate processes, lower costs, and enhance customer and employee satisfaction - all with the goal of increasing revenue! And while it can be difficult to change how your business works, leaving old methods behind and embracing new technology can help lead your business to more success and growth.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business

The IT innovators guide to Digital Transformation

Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business

Intelligence and speed drive 2019 tech trends

Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business

CIS Critical Security Controls - Accelerated & Simplified

Published By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault

How to Build a Security Operations Center (on a Budget)

Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault

What's Under The Hood of Programmatic? Learn The Secret To How Programmatic Buying Works!

Published By: Rocket Fuel     Published Date: Mar 04, 2015
Remember back in the day when digital advertising was simple to understand? Like popping open the hood of a 1972 Ford, all the parts were simple and visible, and how they fit together was intuitive. It made sense. Now? Piecing together the modern digital advertising ecosystem is like trying to assemble a spaceship in your living room. But as Rocket Fuel Director of Artificial Intelligence Michael Benisch explains in our latest whitepaper, using advanced systems to buy media programmatically doesn't have to be overwhelming. Michael will take you "under the hood" of programmatic buying and walk you through the process of how and why a consumer sees the ads they see. Download the whitepaper and pop open the hood before choosing a programmatic partner.
Tags : 
programmatic, programmatic partner, digital advertising, programmatic advertising, online advertising, ad platform, digital marketing, ad network
    
Rocket Fuel

NETCONF by Example: A Description of the NETCONF Protocol with Practical Examples

Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf, networking
    
Tail-f Systems

10 Ways to Improve On-Site Conversions with Social Media

Published By: Janrain, Inc.     Published Date: Feb 28, 2012
Your customers interact with you on social networks, but how effectively are you using social media to connect with them on your website? This white paper explores best practices to build on-site engagement by integrating social tools.
Tags : 
social login, social sharing, game mechanics, gamification, social media, social tools, social networks, facebook
    
Janrain, Inc.

Savvy Sales Leaders Guide

Published By: Microsoft Azure     Published Date: Apr 10, 2018
Help your sellers work smarter and build stronger relationships Sales teams work so hard, they can burn out quickly. It’s tough when customer contacts, sales goals, productivity tools, and social networking are all separated and siloed. Instead of working in separate systems that make day-to-day selling complex, you can help simplify the way your sellers work. And empower your team to be more productive and efficient. Our e-book, “The Savvy Seller’s Guide to Building Profitable Relationships,” is packed with advice for making selling much less painful—and more profitable. Did you know if your lead has had prior exposure to content from your company’s brand, that they’re 25% more likely to respond to your InMail? You’ll find this and more helpful facts in the e-book, including actionable insights to help your team: Identify the right leads—including pinpointing who’s on the buying committee Capture buyers’ attention Use insights and predictive intelligence from AI and machine learni
Tags : 
    
Microsoft Azure

Enterprise Organizations Need to Prepare for Cyber-attack ‘Hunting’

Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security, business technology
    
ArborNetworks

Real-World AI

Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI). With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing.
Tags : 
    
Pure Storage

Real-World AI

Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to analyze and action data using artificial intelligence (AI). Financial services companies can greatly benefit from this leap forward in technology that enables unique insights into all aspects of the industry. With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists now have the ability to tackle complex problems and find credible and profitable solutions.
Tags : 
    
Pure Storage

Network Intelligence Executive Brief

Published By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : 
thousandeyes, network intelligence, business application, application performance management, cloud applications, network management, business continuity, ddos
    
ThousandEyes

Exploring 5G Fronthaul Network Architecture Intelligence Splits and Connectivity

Published By: Intel     Published Date: May 21, 2019
This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel® Silicon Photonics can meet demanding bandwidth requirements
Tags : 
    
Intel

Exploring 5G Fronthaul Network Architecture Intelligence Splits and Connectivity

Published By: Intel     Published Date: May 22, 2019
Please note that this piece of content is in local language This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel® Silicon Photonics can meet demanding bandwidth requirements.
Tags : 
    
Intel

Harmonizing urban movement - How location intelligence is transforming mobility in cities

Published By: HERE Technologies     Published Date: Jul 11, 2019
Whether you’re a private company moving people or goods, or a governmental organization responsible for managing traffic flow, urban environments present a common set of challenges. Greater safety, reduced congestion and pollution, a better consumer experience, more well-organized networks and intuitive vehicle use are shared goals for all those looking to transform urban mobility. City transportation is about to undergo a seismic change. This presents a huge opportunity for businesses to improve their services and for public sector leaders to understand and manage networks more efficiently. By reading this ebook, you will discover how location intelligence helps: - Meet ever-increasing customer expectations of timely pick-ups and deliveries - Improve safety and congestion across a road network - Reduce operational costs and improve efficiency for movers of people and parcels -Maximize the use of fleet vehicles and drivers by efficiently matching supply to demand
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.