Skip to main content
 

analysis

Results 1151 - 1175 of 1283Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: Godfrey     Published Date: Oct 24, 2008
B-to-B Strategic Search has been created by Godfrey to provide the customer-centric, content-driven approach needed for successful business-to-business search performance. It uses all available tools to help B-to-B marketers achieve a presence in the search results of users who are looking for their technology or product. It thus includes both search engine optimization (SEO), the practice of modifying your site to improve organic search results, and search engine marketing (SEM), or paid search.
Tags : 
godfrey, search, b-to-b search, b-to-b strategic search, business-to-business search, search engine optimization, seo, search engine marketing, sem, analytics, integration, web content, keywords, keyword analysis, strategic keyword analysis, search performance, links, analytics, integration
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Godfrey’s Channel Strategy Audit is intended as a guide to assist you in providing the information we need to generate a distribution channel strategy analysis. This audit is organized into several parts, starting with a cursory survey of your business environment, and then concentrating on the key issues that can result in strengthening or reshaping your distribution channel strategy. Although our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you has significant value.
Tags : 
godfrey, channel strategy audit, b2b marcom, channel communications, distribution network, channel marketing, marketing to distributors, distribution channel, sales and marketing distribution, channel distribution, b2b communications
    
Godfrey
Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions, blacklists, seamless multi-channel support
    
ChoiceStream
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.
Tags : 
mimosa systems, ediscovery option, ediscovery risk, pst propogation, mimosa nearpoint
    
Mimosa Systems
Published By: SAP     Published Date: Sep 03, 2010
This paper discusses how Best-In-Class organizations have demonstrated a significant emphasis on providing sales leaders with better information in order to make better decisions. Continue reading to learn how organizations that also deployed solutions such as SAP CRM were consistently among the Best-In-Class.
Tags : 
sales-effective processes, enhanced data analysis, sap, best-in-class, sap crm, sales forecasting deployment, sales mobility, sales force productivity, business performance, kpi, aberdeen
    
SAP
Published By: SPSS     Published Date: Jun 29, 2009
This paper will focus on how a company might identify its best customers, but the same process could be used for other customer segments.
Tags : 
spss, customer management, consumer behavior, customer retention, crm, customer service, cost-effective strategies, customer database, statistical analysis, data management, data analysis, recency, frequency, and monetary value, rfm, best customers, customer lifetime value, chi-square, customer experience
    
SPSS
Published By: MediaVantage     Published Date: May 03, 2011
A whitepaper for PR professionals that gives you the intelligence to analyze why and when to adjust your strategic communication plans.
Tags : 
mediavantage, monitoring, measurement, communications, reptutation management, crisis communications, analysis, investors, public relations
    
MediaVantage
Published By: MediaVantage     Published Date: May 03, 2011
An informative new whitepaper highlights the importance of consistency for your brand's success and offers four recommendations that every PR professional should consider for more effective communications.
Tags : 
mediavantage, communications, planning, management, reputation mangement, social media, strategy, planning, crisis communication, analysis
    
MediaVantage
Published By: Citrix Online     Published Date: Apr 06, 2009
Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle - from risk management and estimating to managing scope and facilitating knowledge transfer - now requires a different recipe.
Tags : 
citrix, project management, project lifecycle, risk management, managing scope, risk, collaboration, projects, stakeholders, virtual collaboration, risk analysis, dashboard, collaboration, saas, virtual, project management
    
Citrix Online
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : 
software security, endpoint security, antivirus software, malware
    
Software Security Solutions
Published By: IBM Software     Published Date: Jul 28, 2010
This brief video explores the issues and the data required to improve sales forecasting accuracy, including the capacity to conduct historical and aggregated multi-dimension analysis.
Tags : 
ibm software, cognos, sales forecasting, analytics, sales cycle, pipeline
    
IBM Software
Published By: IBM Software     Published Date: Oct 05, 2010
Read how Business analytics investments are more important than ever for business competitiveness and profitability and are becoming increasingly essential to maximize a company's return on investment.
Tags : 
ibm cognos, business analytics, business intelligence, bi investment, analytical methods, business planning, data analysis
    
IBM Software
Published By: IBM Software     Published Date: Feb 11, 2011
View this online demo to learn how leading retailers are using market basket analysis to gain insights into buyer patterns to offer products and promotions that match shopper preferences and behaviors as well as to link purchases to specific buyers to create tailored offers.
Tags : 
ibm cognos, predictive analytic, market basket analytics, online demo, retailer, shopper preference, consumer behavior
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
Read this in-depth report to find out how 117 executives of successful companies are reducing maintenance costs, downtime and safety incidents.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: SAS     Published Date: Sep 09, 2010
Collectively - representing more than 100 million unique visitors and more than a billion tweets per month - social media is a force too powerful to ignore. So how Do You Measure and Manage the Impact of Social Media?
Tags : 
sas, social media metrics, descriptive statistics, social network analysis, text analytics, measurement
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
The concept and practice of stress testing has been around for many years. While traditional stress testing methodologies are still valid for firmwide scenario analysis and stress testing, special techniques and attentions are needed to successfully achieve the goal of firmwide capital adequacy in forwardlooking stress scenarios. During the 2007 financial crisis, many financial institutions were not sufficiently prepared for the ensuing liquidity crunch and capital drains. Perhaps if banks had worked through different economic scenarios prior to the crisis, they would have been in a better position to weather the storm. Inadequate preparation for crisis can lead to systemic risk and severe economic and political turmoil.
Tags : 
best practices, risk management, security, analytics
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
With more data in the hands of more people – and easier access to easy-to-use analytics – conversations about data and results from data analysis are happening more often. And becoming more important. And expected. So it’s not surprising that improved collaboration is one of the most common organizational goals. Let’s take a look at how you can use results produced by SAS Visual Analytics with Microsoft Office applications. You’ll see how easy it is to combine sophisticated analytic visualizations and reports with Microsoft’s widely used productivity tools – to share insights, improve collaboration and drive increased adoption of analytics and BI across your organization.
Tags : 
    
SAS
Published By: Tavant Technologies     Published Date: Sep 21, 2010
Integrated and closed-loop warranty management strategy to significantly reduce the total warranty spend and reserves, improve product quality, and increase end-customer satisfaction
Tags : 
warranty white paper, warranty solution, warranty management, warranty integration, cross-functional warranty, warranty cost reduction, warranty intelligence, warranty analysis, warranty challenges, warranty business rules, warranty automation, warranty benchmarking, warranty best in class, warranty improvement
    
Tavant Technologies
Start   Previous    38 39 40 41 42 43 44 45 46 47 48 49 50 51 52    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.