profile

Results 226 - 250 of 299Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 15, 2015
Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.
Tags : 
ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics, risk management, project management
    
IBM
Published By: Symantec     Published Date: Jan 10, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of the enterprise networks and breaches of data security. Read on to learn more about how you can prevent spoofing server to server.
Tags : 
spoofing, communications, how to prevent, s2s, preventing spoofing, new attacks, security threats, symantec, it security, it threats, security, it management, enterprise applications, data management
    
Symantec
Published By: SAS     Published Date: Jun 05, 2017
If you’re dealing with large amounts of data and complex problems, you might be ready to hire a data scientist. But what will you ask in the interview, and how will you evaluate the candidates? In this e-book, we provide 20 interview questions, so you can walk right into the interview knowing what to ask. We also profile three working data scientists, so you can better understand the backgrounds and habits of this new breed of analytical data expert. Whether you’re hiring your first data scientist or your fifteenth, we hope this e-book helps you find the right candidate.
Tags : 
    
SAS
Published By: Bridgeline Digital     Published Date: Sep 26, 2013
Contemporary B2B customers are demanding, savvy, connected 24/7 and definitely mobile. How do B2B marketers satisfy this new evolving customer profile? Firms that lead in the next decade will be those that use customer knowledge to engage and delight buyers and win their business and loyalty away from competitors.
Tags : 
b2b marketing, b2b strategy, customer insights
    
Bridgeline Digital
Published By: Business Software     Published Date: Apr 04, 2013
Today, there is unprecedented pressure on companies in all industry sectors to keep their supply chains running smoothly. This often means that these businesses with their ever-changing distribution channels and production centers feeding those supply chains, need to efficiently manage their warehouses. In this whitepaper, Business-software.com profiles the leading warehouse management software vendors.
Tags : 
top 10 warehouse management software, vendors, revealed, unprecedented pressure, companies, industry, sectors, supply chains, business-software.com, storage, data warehousing
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
More and more, manufacturers realize, that for increased productivity, they need a fully integrated, job-based manufacturing software system that has functionality for quoting, scheduling, job tracking, costing, purchasing, performance metrics and customer relationship management to name a few. In this white paper, Business-Software.com profiles the leading discrete manufacturing software vendors.
Tags : 
business-software.com, top 15 vendors, discrete manufacturing software, revealed
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
With the advent of a new globally-based economy, process manufacturers face significant challenges. Rapidly shifting markets, more empowered buyers, increasing regulation, commodity volatility, and margin pressures, and the effects of a credit crunch bring a “new normal” of constant volatility, variability, and variety to today’s landscape. In order to survive, process manufacturers need to become far more flexible, risk aware, and responsive to generate healthy revenues and profits. But above all else, they need to understand the importance of finding the right software application to drive maximum return on their investment. Business-Software.com profiles the leading process manufacturing software vendors in this white paper, download it now!
Tags : 
top 15 process, manufacturing, software vendors revealed, business-software.com, rapidly shifting markets, increasing regulation commodity
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
An ERP system combines methodologies with software and hardware components to integrate numerous critical back-office functions across a company. Made up of a series of “modules”, or applications that are seamlessly linked together through a common database, an ERP system enables various departments or operating units such as Accounting and Finance, Human Resources, Production, and Fulfillment and Distribution to coordinate activities, share information, and collaborate. In this white paper, Business-Software.com profiles the leading ERP software vendors. Download this white paper to learn more!
Tags : 
business-software.com, erp systems, methodologies, top 20, coordination, business software, knowledge management, enterprise applications
    
Business Software
Published By: NetProspex     Published Date: Nov 04, 2013
How clean & actionable your B2B marketing database is today? Analyze your data with this free, secure cloud based assessment of your email deliverability, phone connectability, record completeness, duplication, target profile breakdown and more.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database list, marketing database services, database cleansing, b2b data cleansing, b2b data quality, b2b contact database, business contact database, b2b technolog data, global contact list, marketo data quality, eloqua data quality, marketo database cleansing, eloqua database cleansing, marketing data enrichment
    
NetProspex
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management, data management
    
Cisco
Published By: HP     Published Date: May 14, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
forrester, it hardware, storage requirements, it decision makers, it management, enterprise applications
    
HP
Published By: HP     Published Date: Jun 05, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management, data management
    
HP
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: eDataSource     Published Date: Jan 05, 2015
There is a lot of email-marketing advice floating around out there. And, frankly, a lot of it is bad. Hunches and conventional wisdom DO NOT drive sound marketing decisions. Data does. And the fresh the data, the BETTER!
Tags : 
email marketing, email competitive information, informative marketing, email competitive profile
    
eDataSource
Published By: Sponsored by Marin Software     Published Date: Aug 11, 2015
Get this free 48 page report and find the best paid media campaign management tool for your organization. Includes vendor profiles and updates on the current trends and issues, including how marketers, search advertisers and vendors are keeping pace with changing ad formats. Download now.
Tags : 
paid media management, ad platforms, search marketing, audience targeting, search tools, marketing campaign, marketing budget, marketing automation
    
Sponsored by Marin Software
Published By: CrowdTwist     Published Date: Nov 28, 2017
In today’s competitive retail environment, it’s not enough to simply meet customer expectations. Brands must exceed them with exceptional customer experiences that make customers feel heard, valued, and devoted to the brand. Brands across industries are embracing engagement-based loyalty programs because they deliver emotionally resonant experiences that go far beyond discounts. Omnichannel loyalty programs deliver rich, nuanced customer data about customers’ profiles, behaviors and needs, so that brands can deliver them more relevant experiences.
Tags : 
    
CrowdTwist
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.