intelligence

Results 1951 - 1975 of 2427Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how Cisco® Advanced Malware Protection (AMP) is the integrated solution that provides visibility into potential threat activity and the control to rapidly contain and remediate malware.
Tags : 
cisco, malware protection, amp, advanced malware protection, global threat intelligence, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 22, 2016
Your network doesn’t just transport data. It serves a myriad of apps and endpoints—mobile devices, sensors, servers, machines, cameras, wearables—and all the employees, customers, and processes that use them. Which means it can produce invaluable contextual intelligence based on real-time analytics to help you navigate the growing demands of business, security, operations, and IT. Cisco DNA delivers crystal-clear visibility across your network so you can enhance mobile experiences and make business decisions quickly and accurately.
Tags : 
    
Cisco
Published By: McAfee     Published Date: Jul 10, 2013
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Published By: Phunware     Published Date: Aug 11, 2014
Mobile devices are streaming millions of location data points in real-time. These data points are extremely valuable in their own right because the very apps that help generate data can also be used to act on insights and deliver relevant messages. Download these insights and examples to turn mobile data into actions.
Tags : 
phunware, mobile, physical marketing analytics, location analytics, business intelligence, space management, customer service, crm
    
Phunware
Published By: Gigya     Published Date: Jun 06, 2014
This white paper will go over three ways user anonymity can negatively affect ROI for businesses and lead to poor customer experiences.
Tags : 
gigya, anonymity, user data, social networking, social networks, customer engagement, customer experience, user insight
    
Gigya
Published By: Server Technology     Published Date: Jan 16, 2015
DCD Intelligence has compiled this White Paper in order to share some industry insights and lessons on the practical steps that are needed to develop a successful power and capacity planning strategy.
Tags : 
server technology, power capacity, power and cooling, data center power, best practices, data center costs, roi, business technology
    
Server Technology
Published By: ForgeRock     Published Date: Sep 02, 2014
Watch this Gigaom Research On-Demand Webinar ; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.
Tags : 
forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
ForgeRock
Published By: Izenda     Published Date: Nov 20, 2014
If you’re responsible for delivery of a .NET application and your users have analytics requirements, you have some decisions to make. Watch Gigaom Research and our sponsor Izenda for “User Driven BI in the Cloud and Within Your Application,” a free recorded analyst webinar.
Tags : 
izenda, business intelligence, saas, saas applications, bi applications, cloud applications
    
Izenda
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
cPacket Networks
Published By: CA Technologies     Published Date: Aug 19, 2014
IT organizations are increasingly being called upon to cost-effectively deliver reliable support for the entire catalog of business services, or risk outsourcing to a managed service provider.
Tags : 
ca technologies, capacity management, business automation, business intelligence, business scoring, business technology
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
The data center is getting bigger and more complex and so too is the asset inventory. Every new asset has an impact on the day–to–day operations of the data center – from power consumption and problem resolution to capacity planning and change management.
Tags : 
ca technologies, dcim, asset management, power, power and cooling, data center energy
    
CA Technologies
Published By: Teradata     Published Date: Nov 06, 2014
As today’s marketing analytics requirements become increasingly cross-channel and real-time, your organization can’t risk crude integration between marketing and analytics assets. Together, these assets must work like a well-oiled machine. So what can you do? Should you integrate standalone marketing and analytics systems? Watch this to discover answers from industry experts.
Tags : 
teradata, business intelligence, marketing intelligence, marketing analytics, marketing automation, business technology
    
Teradata
Published By: Panduit     Published Date: Oct 08, 2014
Proactive capacity management ensures optimal availability of four critical data center resources: rack space, power, cooling and network connectivity. All four of these must be in balance for the data center to function most efficiently in terms of operations, resources and associated costs.
Tags : 
panduit, data center, capacity management, dcim, rack space, power and cooling, servers, storage
    
Panduit
Published By: Sponsored by Spredfast     Published Date: May 11, 2015
This report examines the market for enterprise social media management software (ESMMS) and the considerations involved in implementing ESMMS platforms.
Tags : 
social media management, social media, facebook, twitter, instagram, esmms
    
Sponsored by Spredfast
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
Artificial intelligence (AI) has become the buzzword du jour for endpoint protection platform (EPP) vendors struggling to remain relevant in a rapidly changing threat landscape. Why does one EPP prevent breaches while another only facilitates incident response? BlackBerry Cylance’s new eBook cuts through the noise with a concise analysis of AI’s role in cyber defense and the four key criteria for evaluating EPP investments. Read the BlackBerry Cylance eBook to learn more.
Tags : 
    
BlackBerry Cylance
Published By: Select Hub     Published Date: Nov 07, 2017
Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Unlike some ratings, SelectHub product scores are taken from multiple sources including top analysts and actual buyers of the software—ideal for your shortlist. Find the right BI analytics tools: • Actionable insights from experts: In plain language, find out how each product supports the functions that matter most to your company. • Key requirements criteria: Get a comprehensive list of the key requirements for use in your software evaluation and vendor selection. • Easy pricing: Get recommendations and pricing for solutions matching your business needs. • Includes practical guide: How to Buy Business Intelligence Software Over 80 business analytics and BI tools evaluated. The SelectHub platform contains expert software analysis across key criteria and vendor data. These built-in analyst ratings are combined with subjective user ratings to create SelectHub ratings r
Tags : 
    
Select Hub
Published By: IBM     Published Date: Jul 07, 2014
Business analytics can empower your business managers to make more fact-based, data-driven decisions that improve operating results. Learn more in a report from Nucleus Research.
Tags : 
ibm, profitability, analytics, big data, midmarket, midsize companies, data-driven decision making, predictive analytics
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : 
ibm, security, cyber security, security intelligence, big data, visibility, threat detection
    
IBM
Start   Previous    72 73 74 75 76 77 78 79 80 81 82 83 84 85 86    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.