business intelligence

Results 351 - 375 of 926Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Jul 11, 2013
In the context of these current vulnerability announcements, there is definite cause for concern: vulnerable systems are widespread, they can be exploited remotely, and the exploitation itself seems relatively simple. This means that we likely have only a short window of time before attacks become widespread.
Tags : 
cdw, cdw blog, ipmi, business intelligence
    
CDW
Published By: CDW     Published Date: Jul 11, 2013
BI and Big Data: A Dark Territory
Tags : 
cwd, cdw blog, business intelligence, big data
    
CDW
Published By: CDW     Published Date: Jul 11, 2013
5 Ways to Future-Proof Your Data Center for Big Data
Tags : 
cdw, cdw blog, big data, data center, business intelligence
    
CDW
Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action
    
Advizex
Published By: InfoSys     Published Date: Apr 08, 2013
Big Data: Too Much information, Too Little illumination; As enterprises go about their Big Data adoption journey, there are many pressing questions at hand. What are the Big Data capabilities they desire?
Tags : 
big data, business intelligence, analytics, data warehousing, infosys
    
InfoSys
Published By: Prophix     Published Date: Apr 24, 2013
Learn how leading companies employ Corporate Performance Management (CPM) software to automate financial processes (budgeting, forecasting, reporting, and planning) that spreadsheets complete on a manual basis and reap the rewards of advanced data analysis.
Tags : 
performance management, finance, business intelligence, cpm, enterprise, data, analytics
    
Prophix
Published By: Prophix     Published Date: Apr 24, 2013
Spreadsheets are error-prone and unable to support the critical nature of important financial processes. Read this free guide to learn how leading companies have broken the spreadsheet habit, adopting packaged applications specifically-designed for budgeting and forecasting.
Tags : 
spreadsheets, business intelligence, analytics, budget, roi, efficiency, forecasting, analytics, data
    
Prophix
Published By: Prophix     Published Date: Apr 24, 2013
Built for non-IT professionals, this white paper explains the differences between Business Intelligence (BI) and Corporate Performance Management (CPM), two fast-growing forms of software utilized by leading finance departments today.
Tags : 
cpm, business intelligence, analytics, forecasting, projection, data
    
Prophix
Published By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : 
collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
    
Cisco Systems
Published By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : 
collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
    
Cisco Systems
Published By: QlikTech     Published Date: Aug 27, 2013
The Tectonic Plates are shifting in the BI software market - The promise of business intelligence software is to enable decision makers at all level in an organization to leverage data for business advantage - to explore data, draw insights and meaningful conclusions, and make better decisions. This research paper shows how the QlikView Business Discovery Platform delivers true self-service BI that empowers business users by driving innovative decision-making.
Tags : 
business discovery, powerful, business intelligence, qliktech, idc, small vendors, enabling decision makers, better decisions
    
QlikTech
Published By: Dell     Published Date: Sep 12, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence
    
LogRhythm
Published By: D+H     Published Date: Dec 12, 2016
Here are five things your bank can implement to exceed customer expectations and one-up your competition.
Tags : 
customer service, online banking, customer experience, financial services, credit unions, business intelligence
    
D+H
Published By: FICO     Published Date: Mar 02, 2018
Improved availability of data and new technologies that use it are disrupting our lives, influencing the way we interact with other, and the way we gather and consume information to make decisions. Businesses too are living in a time of continuous technological upheaval. The application of key technologies such as Machine Learning and Artificial Intelligence and Optimization, are fundamentally changing the manner in which businesses make decisions. This paper is your first step in understanding: • how you can leverage and operationalize analytics in your everyday business processes • improve customer relationships • grow revenue in an increasingly competitive world
Tags : 
fico, customers, analytic, management, applications, solutions
    
FICO
Published By: Zebra Technologies     Published Date: May 14, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
mobile, shipping, manufacturing, warehouse, global, shopping, fulfillment
    
Zebra Technologies
Published By: Infosys BPM Ltd     Published Date: Feb 12, 2019
An effective rolling forecast is important to estimate long term financial plans. Every organization undertakes this process as a finance activity. However, when the forecasted data is examined on its effectiveness for decision making, more often than not the results are disappointing, and the rolling forecast process needs to be redefined. This paper talks about effective rolling forecasts that utilize resources, technologies, processes, and business intelligence to deliver actionable insights. A best-in-class matured RF process will enable CFOs to deliver great results through increased revenue and cost reductions, and create new benchmarks for the organization.
Tags : 
    
Infosys BPM Ltd
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.