call intelligence

Results 26 - 50 of 67Sort Results By: Published Date | Title | Company Name

Embed the power of optimization into your manufacturing operations

Published By: FICO - APAC     Published Date: Jul 10, 2017
Historically, manufacturers have “looked to the past” to help predict what they need to do in the future. This would include basic business intelligence, powered by spreadsheets, and even manual processes.
Tags : 
    
FICO - APAC

Advanced Attacks Require Federal Agencies to Reimangine IT Security

Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye

New Security Challenges for State and Local Governments

Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals

Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats

Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Taking a Lead-Forward Approach to Combat Today's Cyber Attacks

Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks

Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

The Need for Speed: 2013 Incident Response Survey

Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

IDC Thinking Supply Chain Whitepaper

Published By: Group M_IBM Q119     Published Date: Jan 04, 2019
Digital transformation is poised to change the supply chain more profoundly than any other functional area and more dramatically than at any point in its history in terms of driving efficiency and resiliency to disruption. In the context of the challenges facing supply chains, both now and in the future, it becomes clear that the old ways of working will not suffice and that even best-in-class performance today is unlikely to be good enough in the future. It is the view of IDC that the supply chain must become a "thinking" supply chain, one that is intimately connected to all data sources, enabled with comprehensive and fast analytics, openly collaborative through cloud-based commerce networks, conscious of cyberthreats, and cognitively interwoven. According to IDC supply chain research, technology is emerging as a prime driver of change, particularly artificial intelligence, blockchain, and the Internet of Things (IoT).
Tags : 
    
Group M_IBM Q119

Cognitive Equipment Advisor PoV

Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
US ground forces handle massive amounts of information and data while working under unpredictable conditions. These conditions don’t always allow military intelligence analysts access to a technologically reliable way to share information.  AI can help develop a comprehensive intelligence picture and a true sense of cognitive situational understanding (CSU). These technologies can help analyze the massive amounts of data the military receives. And because AI programs are constantly adding new capabilities and tools, they can help the military prepare for the battlefield of the future. Read how. 
Tags : 
    
Group M_IBM Q2'19

IBM Security Services Cyber Security Intelligence Index

Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM

Architecting a Big Data Platform for Analytics by Mike Ferguson

Published By: IBM     Published Date: Mar 05, 2014
For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse. Typically, a history of business activity is built up over a number of years allowing organizations to use business intelligence (BI) tools to analyze, compare and report on business performance over time. In addition, subsets of this data are often extracted from data warehouses into data marts that have been optimized for more detailed multi-dimensional analysis.
Tags : 
ibm, big data, data, big data platform, analytics, data sources, data complexity, data volume, data generation, data management, storage, acceleration, business intelligence, data warehouse, analytical applications, data mining, data warehousing
    
IBM

IDC Intelligence-Led Security

Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM

Disrupting Procurement with AI

Published By: IBM     Published Date: Aug 01, 2018
Inefficient contracting can cause firms to lose up to 40% of a deal’s value--but contracting doesn't have to be inefficient anymore. Watson can help your procurement teams dramatically cut the time they spend manually reading through, highlighting and comparing dense contracts--all while increasing the accuracy of their work. Join IBM Watson and client experts as they share how easy it is to start applying artificial intelligence to streamline contract reviews and improve accuracy. Get started today ... and in as little as six weeks, your contract governance teams can be implementing a transformative AI-solution.
Tags : 
    
IBM

Contact Center Software: Compare 6 Leading Solutions

Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon, contactual, interactive intelligence, crm, customer relationship management, insidecrm, inside crm, call center management, sales & marketing software, contact management
    
InsideCRM.com

CEMOSoft Delivers Data-Driven Retail from the IoT Edge to the Cloud

Published By: Intel     Published Date: Apr 09, 2019
Retailers, along with many other vertical industries, seek to take advantage of the benefits of the Internet of Things (IoT) to improve customer experience management. However, quickly analyzing relevant data to inform decision-making and respond e?ectively to rapidly changing customer behaviors is challenging. The CEMOSoft* platform is designed to create opportunities, while addressing shifting demographics and an evolving IoT landscape. It o?ers a mobile customer engagement experience that can be dynamically modified on the ?y, along with the increased security and intelligence of an Intel® architecture based IoT gateway and Windows® 10 IoT Core. The result is an a?ordable, ?exible, scalable platform that brings ongoing customer insight to many aspects of daily operations
Tags : 
    
Intel

Comfort & Security in the Cloud

Published By: Interactive Intelligence     Published Date: Feb 21, 2013
Comfort & Security in the Cloud - Read this white paper to learn how communications as a service delivers superior technology stability and resiliency. Learn about the world of the contact center and the technology today that offers richness and more
Tags : 
comfort and security in the cloud, white papers, learn communications, call centers, caas. communications as service, interactive intelligence, enterprise applications, business technology, telecom, data center
    
Interactive Intelligence

8 Tips for Outbound Calling Compliance for the Debt Collection Industry

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Representatives from the debt collection industry make billions of contacts with consumers on behalf of creditors every year. With compliance being necessary -- this paper will explore critical sites of outbound calling compliance.
Tags : 
outbound calling, calling compliance, fdcpa, debt collection industry, compliance tips and suggestions, hot button issues, interactive intelligence, knowledge management, enterprise applications, business technology, telecom
    
Interactive Intelligence

Driving to One Percent: Call Analysis/Answering Machine Detection

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Driving to one percent - In this series, we view this phenomenon from a business perspective and how seemingly minor additions, deletions, or shifts can reap substantive results.
Tags : 
driving to one percent, call analysis, answering machine detection, interactive intelligence, fdcpa compliance, knowledge management, enterprise applications, business technology, telecom
    
Interactive Intelligence

Business as Usual - How Much Is It Costing you?

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Why industry best call analysis matters -- Case studies highlighting the latest disruptive technology for the collections and telemarketing industries from Interactive Intelligence.
Tags : 
business as usual, how much is it costing you, telemarketing industries, interactive intelligence, case studies, knowledge management, enterprise applications, business technology
    
Interactive Intelligence

The Quick Guide to Conversation Analytics

Published By: LogMyCalls     Published Date: Oct 20, 2014
Call tracking is not enough. Call tracking tells you which marketing channels produced phone calls...Conversation Analytics tells you which phone calls produced revenue.
Tags : 
call tracking, conversation analytics, marketing analytics, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls

45 Cool Analytics We Can Extract From Phone Calls

Published By: LogMyCalls     Published Date: Oct 20, 2014
Every customer phone conversation has data that can be used to improve marketing and sales. Here are 45 data points we can extract by automcatically analyzing phone conversations.
Tags : 
call tracking, conversation analytics, marketing analytics, marketing automation, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls

14 Critical Metrics We Extracted from Phone Calls in Q1

Published By: LogMyCalls     Published Date: Oct 20, 2014
We analyzed millions of calls in Q1, and there's gold to be mined out of every customer conversation, data that will improve marketing.
Tags : 
call tracking, conversation analytics, marketing analytics, business intelligence, big data, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls

Security Information and Event Management (SIEM) Orchestration

Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.