global intelligence

Results 1 - 25 of 87Sort Results By: Published Date | Title | Company Name

2011 Global Assessment Trends Report

Published By: SHL     Published Date: Dec 13, 2011
SHL's Global Assessment Trends Report provides human resources professionals and those interested in learning about global assessment practices a comprehensive look at how organizations around the world measure talent.
Tags : 
gatr, trends, trends report, global assessment trends, global assessment trends report, global assessments, talent measurement practices, talent measurement trends, people intelligence programs, people intelligence, global assessment practices, remote testing, social media, interview, selection, recruiting, hiring practices, talent management, workforce programs, human resources professionals
    
SHL

2018 Outlook: Customer Experience and Security Strike a Balance

Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

7 Key Questions to Ask When Selecting an Incident Response Service Provider

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

A blended future: The changing mix of IT service delivery and consumption

Published By: EMC Corporation     Published Date: May 27, 2014
Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

Accenture Unveils Real-Life Performance Results for Oracle Autonomous Data Warehouse

Published By: Oracle     Published Date: Jan 09, 2019
The Accenture Oracle data team has more than 20,000 professionals, who aid in delivering 50 billion transactions a day across more than three exabytes of data for clients globally. Accenture Oracle data specialists recently put the Oracle Autonomous Data Warehouse to a rigorous performance test to provide a real-life application usage experience. The data was then extrapolated and expanded to nine years’ worth of data to test the performance. Learn directly from Accenture experts about testing methodology and results that enable them to deliver more data intelligence faster to the enterprise and transform the way people live and work.
Tags : 
    
Oracle

Achieve Customer Centricity in a Hyper-Connected World (IIA)

Published By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
    
SAS

Adapt Layered Defenses for Comprehensive Malware Protection

Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense", security, it management
    
McAfee

Advanced Malware Protection: A Buyer’s Guide

Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco

Aternity for Salesforce

Published By: Aternity     Published Date: Jul 20, 2012
Read in only 5 pages about how Global 2000 organizations are monitoring end user behavior in physical and virtual desktop environments with Aternity's Frontline Performance Intelligence Platform. Monitor the Cloud, drive SLAs, Citrix/VDI monitoring, and much more.
Tags : 
technology, help desk, management, it management, customer relationship management, project management, service management, business technology, research
    
Aternity

Building Resilience in a Digital Enterprise: Transforming from compliance to risk management

Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security

Business Intelligence for Decision Makers: Actionable Insights for Business Decision Makers.

Published By: SAP Inc.     Published Date: Jul 28, 2009
Although many organizations have made significant investments in data collection and integration (through data warehouses and the like), it is a rare enterprise that can analyze and redeploy its accumulated data to actually drive business performance.  In the years to come, as globalization and increased reliance on the Internet further complicate, accelerate and intensify marketplace conditions, actionable business intelligence promises to deliver a formidable competitive advantage to firms that leverage its power.
Tags : 
sap, business intelligence, business insight, business transparency, cross-enterprise data, inter-enterprise data, data integration, enterprise applications, data management, international computing
    
SAP Inc.

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
    
Cisco

Combat the Latest Security Attacks With Global Threat Intelligence

Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, data loss prevention
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions, compliance, internet security, intrusion detection, intrusion prevention, network security appliance, security policies, business intelligence, vulnerability management, data loss prevention
    
IBM

Combat The Latest Security Attacks With Global Threat Intelligence

Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security, security, data quality, database security
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security, knowledge management, enterprise applications
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : 
ibm, security, ibm x-force, threat intelligence, enterprise applications, business technology
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM

Connected Intelligence in the World’s Best Banks

Published By: TIBCO Software     Published Date: May 16, 2019
Banks globally are betting big on artificial intelligence and machine learning to give them the technological edge they need for more real-time, personalized and predictive banking services. A framework will help both differentiate early winners and provide them with sustained advantages in intelligence. Download this IDC Analyst Infobrief to learn about how the world’s best banks are becoming more personal, more predictive, and more real-time than ever. What you will learn: 8 trends that reflect bank’s readiness for connected intelligence 9 pitfalls to avoid & 9 ways to bridge the gaps The personal, real-time and predictive building blocks of AI & ML for banks Notable leaders based on IDC Financial Insights’ research and their respective use cases Essential guidance from IDC to leading banks
Tags : 
data, analytics, customer, banks, intelligence, capabilities, customers, insights, banking
    
TIBCO Software

Convergence, collaboration and culture: The evolution of governance, risk and compliance

Published By: IBM     Published Date: Jun 17, 2014
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.
Tags : 
ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics, business intelligence
    
IBM

Discover. Evaluate. Act. Reduce Risk With Real-Time Identification, Assessment, and Response.

Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security, it management, data management, business technology, data center
    
McAfee
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.