metadata

Results 1 - 25 of 105Sort Results By: Published Date | Title | Company Name

WP – Digital Transformation

Published By: Gigamon     Published Date: Jun 21, 2019
Accelerate your digital transformation journey by giving teams and tools the application visibility needed to monitor and secure modern digital applications. Download this whitepaper to learn how you can Isolate and extract application and component traffic across multiple tiers for monitoring, Provide application metadata to analytics tools, enabling faster detection of customer experience, application performance and security-related issues and send only relevant traffic to the appropriate tools to reduce load and increase effectiveness.
Tags : 
    
Gigamon

WP – Harnessing the Power of Metadata for Security

Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon

How to Gain Control of Complex Applications in the Time of Digital Transformation

Published By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper “How to Gain Control of Complex Applications in the Time of Digital Transformation” to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
    
Gigamon

Gain a Decisive Advantage in Cyber

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity

2018 Gartner Magic Quadrant for Metadata Management Solutions

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
    
Group M_IBM Q2'19

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Mar 26, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Tips for Real-Time Database Streaming for Kafka

Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity

A guide to optimizing digital marketing performance through better data.

Published By: Claravine     Published Date: Jan 03, 2019
Marketers have long struggled with the simple task of knowing which marketing spend is truly effective, and how to optimize that spend. At the heart of the issue lies the challenge of ensuring the data quality and consistency exists to make decisions based on real intelligence. Why is this a problem? First, effective tracking is reliant on the consistent, complete application of campaign tracking codes and associated metadata, which has traditionally been a manual, ungoverned process. Adding to this complexity has been the dramatic expansion of digital marketing point solutions, and the disparate teams expected to execute across each of these channels and geographies. The result is what you would expect—highly inaccurate, incomplete, and inconsistent data that must be manually cleaned before reporting is possible. Fortunately a solution exists. Progressive marketing leaders are implementing Digital Experience Data Management (DXDM), ensuring the rich, consistent insights critical to ma
Tags : 
    
Claravine

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Guide to Supporting On-Premise Spark Deployments with a Cloud-Scale Data Platform

Published By: Pure Storage     Published Date: Dec 05, 2018
With the growth of unstructured data and the challenges of modern workloads such as Apache Spark™, IT teams have seen a clear need during the past few years for a new type of all-flash storage solution, one that has been designed specifically for users requiring high levels of performance in file- and object-based environments. With FlashBlade™, it addresses performance challenges in Spark environments by delivering the consistent performance of all-flash storage with no caching or tiering, as well as fast metadata operations and instant metadata queries.
Tags : 
    
Pure Storage

Falcon Discover AWS Solution Brief Report

Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA

How AMP Ltd. Built a Cloud Data Lake It Could Trust

Published By: AWS     Published Date: Oct 31, 2018
Today AMP Ltd. integrates and manages its customer data more efficiently using a single Talend platform that enables data reconciliation, quality-assessment dashboards, and metadata management. Ten billion rows of AMP Ltd. data are computed in less than an hour. In this webinar you will learn how you can modernize your data architecture to help you collect and validate data, act upon it, and transform your organization for the digital age.
Tags : 
amp, cloud, data, customer, reconciliation, digital
    
AWS

Intelligent ECM: Taking an API, cloud-based approach

Published By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
    
Box

See how cloud capture brings business into the digital age

Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box

Agile Enterprise Metadata Management

Published By: MarkLogic     Published Date: May 07, 2018
Executives, managers, and users will not trust data unless they understand where it came from. Enterprise metadata is the “data about data” that makes this trust possible. Unfortunately, many healthcare and life sciences organizations struggle to collect and manage metadata with their existing relational and column-family technology tools. MarkLogic’s multi-model architecture makes it easier to manage metadata, and build trust in the quality and lineage of enterprise data. Healthcare and life sciences companies are using MarkLogic’s smart metadata management capabilities to improve search and discovery, simplify regulatory compliance, deliver more accurate and reliable quality reports, and provide better customer service. This paper explains the essence and advantages of the MarkLogic approach.
Tags : 
agile, enterprise, metadata, management, organization
    
MarkLogic

The Opportunity of Real World Data

Published By: MarkLogic     Published Date: May 07, 2018
Learn how Life Sciences organizations can accelerate Real World Evidence by achieving faster time to insight with a metadata-driven, semantically enriched operational platform. Real World Evidence (RWE) is today’s big data challenge in Life Sciences. Medical records, registries, consultation reports, insurance claims, pharmacy data, social media, and patient surveys all contain valuable insights that Life Sciences organizations need to ascertain and prove the safety, efficacy, and value of their drugs and medical devices. Learn how Life Sciences organizations can accelerate RWE with a metadata-driven, semantically enriched operational platform that enables them to: • Unify, harmonize and ensure governance of information from diverse data sources • Transform information into evidence that proves product efficacy and safety • Identify data patterns, connections, and relationships for faster time to insight
Tags : 
data, integration, drug, device, manufacture, science
    
MarkLogic

Agile Enterprise Metadata Management

Published By: MarkLogic     Published Date: Mar 29, 2018
Executives, managers, and users will not trust data unless they understand where it came from. Enterprise metadata is the “data about data” that makes this trust possible. Unfortunately, many healthcare and life sciences organizations struggle to collect and manage metadata with their existing relational and column-family technology tools. MarkLogic’s multi-model architecture makes it easier to manage metadata, and build trust in the quality and lineage of enterprise data. Healthcare and life sciences companies are using MarkLogic’s smart metadata management capabilities to improve search and discovery, simplify regulatory compliance, deliver more accurate and reliable quality reports, and provide better customer service. This paper explains the essence and advantages of the MarkLogic approach.
Tags : 
enterprise, metadata, management, organizations, technology, tools, mark logic
    
MarkLogic

5 Data management for analytics best practices  

Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS

Top 10 Checklist for Sourcing DPI.

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata, updates
    
Rohde & Schwarz Cybersecurity

Flashblade For EDA

Published By: Pure Storage     Published Date: Nov 02, 2017
The verification workload comprises hundreds of millions of small files, very high metadata, and extremely high performance read, write, and delete requirements. The Pure Storage FlashBlade product’s innovative design provides high IOPS and throughput, and low latency and fast deletes – yielding an average 25% faster wall clock completion time.
Tags : 
effortless, efficient, smart storage, workloads, performance, flash blade, connectivity
    
Pure Storage

Gigamon / Splunk – Accelerate Threat Detection and Response

Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon

Tech WP: Harnessing the Power of Metadata for Security

Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon

The Network Never Lies

Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.