detect

Results 1 - 25 of 690Sort Results By: Published Date | Title | Company Name
Published By: GBG Loqate     Published Date: Jul 09, 2015
Businesses are vulnerable when they assume that their data is accurate, because they are almost always losing money without their knowledge. When it comes to data quality, the problems that you don’t suspect are often worse and more pervasive than the ones you are aware of. Addresses are subject to their own specific set of rules. Detecting and correcting address errors is a complex problem, and one that can only be solved with specialized software.
Tags : 
data, data management, data quality, loqate
    
GBG Loqate
Published By: GBG Loqate     Published Date: Jul 09, 2015
Businesses are vulnerable when they assume that their data is accurate, because they are almost always losing money without their knowledge. When it comes to data quality, the problems that you don’t suspect are often worse and more pervasive than the ones you are aware of. Addresses are subject to their own specific set of rules. Detecting and correcting address errors is a complex problem, and one that can only be solved with specialized software.
Tags : 
    
GBG Loqate
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
"Security Delivery Platforms for Dummies" shows IT professionals how to transform the network deployment of security and monitoring tools for better efficiency and effectiveness. Learn how to detect threats faster by removing network blind spots, monitor what's happening across the global enterprise and optimize your security tools’ performance and efficacy. If you are responsible for protecting corporate networks or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel
Published By: Intel     Published Date: Dec 13, 2018
Advanced image analysis and computer vision are key components of today’s AI revolution and is becoming critical for a wide range of industry applications, including healthcare, where this technology is being used to detect anomalies and improve patient care. Due to a lack of integrated tools and experience with these cutting-edge technologies, however, deploying complete systems is difficult. Applications that utilize deep learning approaches often require large amounts of highly parallel compute power, storage, and networking capabilities, along with performance optimizations for faster data analysis. The Intel and QNAP/IEI solution combines all these elements in one complete system for scalable data management for hospitals and clinics of all sizes. Read more on Intel’s and QNAP/IEI’s real-world use case on macular degeneration analysis through high-performance computing, vision capabilities, storage, and networking in a single solution.
Tags : 
    
Intel
Published By: Forcepoint     Published Date: Jan 07, 2019
The EU General Data Protection Regulation (GDPR) is now in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : 
human resources, cisco, employees, data, analysis
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Genesys     Published Date: Jun 06, 2017
In this ebook, learn: - Five trends will have the biggest impact on customer experience - How to use machine learning to detect patterns and trends to deliver the next great customer experiences - How to future-proof your contact center and adapt to changing customer needs
Tags : 
genesys, customer experience, contact center solutions, contact center, customer needs
    
Genesys
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
A fresh approach to cloud-based website load testing is proving more effective in identifying and isolating application performance anomalies.
Tags : 
    
HP Enterprise Business
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept