Skip to main content
 

data search

Results 1 - 25 of 391Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: HERE Technologies     Published Date: Sep 23, 2019
How can brands create relevant, authentic advertising experiences with real-world location intelligence? Innovative brands and marketers are looking for data sets and services that contextualize consumer movements and habits in the world around them. Understanding location and its connection to customer behavior is key to increasing the effectiveness of retail campaigns and diving deeper into audience behavioral patterns. HERE enables relevant and authentic experiences through real-time location intelligence. As the world’s leading location platform*, HERE also shares its insights into the future of reaching customers on their mobile devices as they travel. *Souce: Ovum and Counterpoint Research annual indexes
Tags : 
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: Intel     Published Date: Sep 30, 2019
Mountains of data promise valuable insights and innovation for businesses that rethink and redesign their system architectures. But companies that don’t re-architect might find themselves scrambling just to keep from being buried in the avalanche of data. The problem is not just in storing raw data, though. For businesses to stay competitive, they need to quickly and cost-effectively access and process all that data for business insights, research, artificial intelligence (AI), and other uses. Both memory and storage are required to enable this level of processing, and companies struggle to balance high costs against limited capacities and performance constraints. The challenge is even more daunting because different types of memory and storage are required for different workloads. Furthermore, multiple technologies might be used together to achieve the optimal tradeoff in cost versus performance. Intel is addressing these challenges with new memory and storage technologies that emp
Tags : 
    
Intel
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
    
SDL
Published By: Oracle     Published Date: Sep 27, 2019
HR has never been more in the spotlight. So it’s never been more important to not just store your data, but use it to transform ways of working. This trend-led research report explores how HR leaders need to become data leaders, using connected data to drive innovation, productivity and growth. Discover insights from those leading the way, and delve into the links between transforming culture and significant growth. Read our report for HR leaders now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 25, 2019
The digital age will transform your supply chain. With hyperconnected, intelligent data at the heart of your logistics you’ll drive your company’s success. Our latest research reveals how today’s supply chain leaders create innovation, consistency and value by employing connected data. It addresses key organisational challenges that you need to be aware of. These include how to disrupt the culture of not just your team, but your whole company, to transform it into a data leader. This is a guidebook for the future of responsive, hyperconnected supply chains. Discover how to become a supply chain leader now.
Tags : 
    
Oracle
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software
Published By: SAP     Published Date: Feb 03, 2017
The SAP HANA platform provides a powerful unified foundation for storing, processing, and analyzing structured and unstructured data. It funs on a single, in-memory database, eliminating data redundancy and speeding up the time for information research and analysis.
Tags : 
    
SAP
Published By: HP     Published Date: Dec 03, 2015
The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research
    
HP
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: HERE Technologies     Published Date: Oct 02, 2019
How can brands create relevant, authentic advertising experiences with real-world location intelligence? Innovative brands and marketers are looking for data sets and services that contextualize consumer movements and habits in the world around them. Understanding location and its connection to customer behavior is key to increasing the effectiveness of retail campaigns and diving deeper into audience behavioral patterns. HERE enables relevant and authentic experiences through real-time location intelligence. As the world’s leading location platform*, HERE also shares its insights into the future of reaching customers on their mobile devices as they travel. *Souce: Ovum and Counterpoint Research annual indexes
Tags : 
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Very little data is available on how effectively enterprises are managing private cloud deployments in the real world. Are they doing so efficiently, or are they facing challenges in areas such as performance, TCO and capacity? Hewlett Packard Enterprise commissioned 451 Research to explore these issues through a survey of IT decision-makers and data from the Cloud Price Index.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: HP Enterprise Business     Published Date: Mar 02, 2017
Powered by data from 451 Research, the Right Mix web application benchmarks your current private vs public cloud mix, business drivers, and workload deployment venues against industry peers to create a comparative analysis. See how your mix stacks up, then download the 451 Research report for robust insights into the state of the hybrid IT market.
Tags : 
    
HP Enterprise Business
Published By: HERE Technologies     Published Date: Dec 06, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 06, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behavior is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualizes consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Pentaho     Published Date: Nov 04, 2015
This report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies based on TDWI research plus survey responses from 325 data management professionals across 13 industries. It also covers Hadoop best practices and provides an overview of tools and platforms that integrate with Hadoop.
Tags : 
pentaho, analytics, platforms, hadoop, big data, predictive analytics, data management
    
Pentaho
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.