access intelligence

Results 26 - 50 of 65Sort Results By: Published Date | Title | Company Name
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint
    
Symantec
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : 
performance, iot readiness, simplicity, user centricity, analytics capability, unified management
    
Alcatel Lucent Enterprise
Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Netsuite     Published Date: Jul 24, 2017
Baseball has always collected in-game data. However, until recently, fans didn’t have easy access to the various statistics that coaches used for key decisions important for the development of the players and success on the baseball field. It’s not unlike how traditional business intelligence is delivered. Data and reports are set aside for a few experts who determine what is important for you. Today, baseball statistics are widely available during broadcasts on TV, PCs and mobile devices. Basic data displays like inning and score are enhanced with metrics meaningful to students of the game, such as pitch speed, strikeout percentages and hit zones. It’s a good example of vital information being delivered in real-time, on demand and in context.
Tags : 
    
Netsuite
Published By: Epicor     Published Date: Jul 06, 2017
It’s hard to make good decisions without good information. Having access to data, and the tools to quickly analyze that data, is essential. Without data, you are blind to how your business is performing and areas for improvement—all you have to go on is instinct. A robust business intelligence (BI) system can provide new insights to help steer your distribution organization clear of obstacles that impede growth—and toward the opportunities that enable it. A monthly report just doesn’t cut it anymore. You need real-time information, and if you’re running legacy software, it’s probably slowing you down.
Tags : 
erp software, enterprise resource planning software, business intelligence, distribution, inventory management, distribution software
    
Epicor
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Epicor     Published Date: Jun 22, 2017
If you’ve started to think your lumber and building materials (LBM) business could be getting more from your software, then it might be time for a change. It is no longer sufficient to own a solution that is “good enough.” The most successful LBM companies know that growth comes from integrated online trading, access to business intelligence tools, and using technology to be more efficient. It can be daunting to make the switch to a new enterprise resource planning (ERP) system, and with so many options, it’s hard to know when if you’re choosing the right one. Epicor has provided LBM businesses with the tools needed to make the most informed software choice. The lumber and building materials solutions evaluation kit consists of three white papers that tell you: • How to know when you’ve outgrown your current software solution • How to choose between generic and industry-specific ERP systems • How to outperform in an era of LBM sales growth You’re ready for growth. Learn how Epicor ca
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements, compliance
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution
    
IBM
Published By: Teradata     Published Date: Jan 16, 2015
Companies that use SAP® need to have a method to access all valuable information that is recorded in order to make the best business decisions and establish a sustainable competitive advantage. With Teradata Analytics for SAP®, Lamb Weston, a global frozen potato product producer, has been able to generate their business intelligence reports quickly and effortlessly. BI that lets you focus on running the business…Download now!
Tags : 
teradata, sap, product producer, sap success
    
Teradata
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence
    
Tyco Integrated Security
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Impact Radius     Published Date: Oct 08, 2014
If you are relying on affiliate networks you have no access to vital data to manage affiliate processes such as tracking, reporting, and contracting. The affiliate networks own the data and control what brands you are able to see. You receive an incomplete view of conversion and performance data, and you are unable to track the true source of every lead across multiple channels. So how could you manage your affiliate programs with the benefits of Big Data intelligence? Read this MarketingProfs whitepaper and get the Big Data intelligence you need to manage a successful affiliate program.
Tags : 
    
Impact Radius
Published By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : 
access management, iam, intelligence, business context, identity
    
RSA
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
    
Datawatch
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: athenahealth     Published Date: Sep 05, 2013
Business intelligence analytics streamline the task of gathering critical data across the health care enterprise and turns it into readily accessible, actionable information. Health care business intelligence is a package of software and services that offers clarity on and control over the vast amount of data needed to successfully run a medical organization.
Tags : 
health care business intelligence, business intelligence, analytics, medical organization
    
athenahealth
Start   Previous    1 2 3    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.