practical use

Results 26 - 47 of 47Sort Results By: Published Date | Title | Company Name

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future

Azure Serverless Computing Cookbook

Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft

Visual Communication: Core Design Principles for Displaying Quantitative Information

Published By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : 
visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation, cognos, business analytics, business intelligence, business metrics, collaboration, information management
    
Cognos

Whitepaper: Reinventing Antivirus: Cloud architecture and behavior recognition are changing the game

Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development, business technology
    
Webroot

Eight recommendations for turning engagement measurement into results

Published By: Success Factors     Published Date: Aug 19, 2014
Engaged employees perform better, stay longer, keep customers happier, and boost company revenue. That’s why it’s critical to embed employee engagement deeply into your culture. What practical steps can you take in this direction? Start with expert advice from leading, respected sources. Download these engagement resources for real-world guidance on: How to measure engagement in your organization—and use the results
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors

Microsoft Exchange Server: To Outsource Or Not To Outsource

Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, outsource, outsourcing, microsoft exchange, hosted exchange, mobile services, eprocurement, it spending, collaborative commerce, workforce management software, financial management, expense management
    
123Together

Apply Artificial Intelligence to Information Security Problems

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance

Customer Loyalty: How to Earn It, How to Keep it.

Published By: GoToAssist     Published Date: Oct 05, 2011
It is imperative in today's economy to not only gain customers but to keep them. Without the right set of tools and measurements, however, this can be a daunting task. Watch this on-demand webinar with Jill Griffin, author of Customer Loyalty, as she delves into practical tools you can use to measurably improve the satisfaction and brand attachment of high-value customers.
Tags : 
citrix, webinar, customer loyalty, technology, tools, improve satisfaction, best practices, business analytics, customer interaction service, customer relationship management, customer satisfaction, customer service
    
GoToAssist

Developing more effective mobile enterprise programs

Published By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : 
effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device, byod, programs for employees, mobile capabilities, how-to, enterprise partners, development and support, wireless, business intelligence
    
IBM

Six keys to effective reputational and IT risk management

Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation, security, it management, data protection, business technology
    
IBM

The Art of the Follow-Up: 3 Ways to Engage Clients

Published By: Cisco     Published Date: Nov 30, 2016
Every sales professional has experienced the frustration of the follow-up to a meeting — the unanswered voice messages, wasted emails, or the “not interested” replies. Traditional follow-up techniques often fail because they don’t feel personal enough to the customer. Meanwhile, reaching out to prospects in-person isn’t always practical because on-site meeting invites may be costly or inefficient.
Tags : 
    
Cisco

Top BI Analytics Tools 2017—Expert Reviews & Pricing

Published By: Select Hub     Published Date: Nov 07, 2017
Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Unlike some ratings, SelectHub product scores are taken from multiple sources including top analysts and actual buyers of the software—ideal for your shortlist. Find the right BI analytics tools: • Actionable insights from experts: In plain language, find out how each product supports the functions that matter most to your company. • Key requirements criteria: Get a comprehensive list of the key requirements for use in your software evaluation and vendor selection. • Easy pricing: Get recommendations and pricing for solutions matching your business needs. • Includes practical guide: How to Buy Business Intelligence Software Over 80 business analytics and BI tools evaluated. The SelectHub platform contains expert software analysis across key criteria and vendor data. These built-in analyst ratings are combined with subjective user ratings to create SelectHub ratings r
Tags : 
    
Select Hub

It's Not All About Prospects: 4 Keys to Higher Customer Retention with Nurturing Programs

Published By: TreeHouse Interactive     Published Date: Jul 27, 2010
This quick guide-written by marketing automation expert Ardath Albee details practical strategies and tactics to use in retaining customers.
Tags : 
treehouse, marketing automation, b2b, b2c, branding, objectives, nurturing, channel relationships
    
TreeHouse Interactive

TDWI Checklist Report: Marketing Analytics Meets Artificial Intelligence: Six Strategies for Success

Published By: SAS     Published Date: Apr 25, 2017
This Checklist explores how AI can be used to enhance marketing analytics and to help companies both better understand their customers and deliver a great customer experience. It also provides practical advice on how organizations can use what they may already be doing to become more effective in marketing.
Tags : 
    
SAS

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Real-time Agility: Core Principles and Practices for Embedded-Software Teams

Published By: IBM     Published Date: Oct 10, 2014
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development.
Tags : 
ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies, ebook, software teams, growing popularity, growing scalability, real-time, embedded software, solution for systems, software development, it management, change management, collaboration
    
IBM

Real-time agility: Core principles and practices for embedded-software teams

Published By: IBM     Published Date: Mar 10, 2015
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.
Tags : 
real-time agility, ibm, agile methods, software development, it management, best practices, business intelligence, business management
    
IBM

ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application

Published By: IBM     Published Date: Aug 10, 2009
Practically every CIO office is focused on quickly exploiting opportunities to drive value for the business. Decisions about seamlessly integrated and personalized portal infrastructures with high operational efficiencies are top of mind. Through agile and unique online experiences, portals bring together applications, information sources and people – in the contexts of role and associated business processes – on the Web and across the value chain. Additionally, they increase talent effectiveness and productivity while lowering costs, and they drive value chain agility and customer advocacy.
Tags : 
ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application integration, websphere portal express, soa, linux, wsrp, rest, tco, ajax, system p5, platforms, data management, service oriented architecture
    
IBM

Email Server Essentials

Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration, email security
    
Alt-N Technologies

How to Save $750 Per Year on Your Web Conferencing

Published By: Business.com     Published Date: Jan 16, 2013
One of the newest and most practical uses of corporate technology is web conferencing, which allows people from multiple locations to meet and/or collaborate at the same time. With this being a rising necessity, Learn how to save on web conferencing.
Tags : 
resource nation, web conferencing, saving on web conferencing, collaboration, knowledge management, enterprise applications, business technology
    
Business.com

Collaboration for Today's Workforce: 3 Ways Any Team Can Work Better with Box

Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.