events

Results 176 - 200 of 237Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: IBM     Published Date: Feb 04, 2016
IBM Operational Decision Manager Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
analytics, ibm, operational decision manager, operations, brand, data, big data, trends, business technology
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Marin Software     Published Date: Jun 24, 2008
One of the big challenges in search engine marketing is getting all of the volume you want from your campaign.  However, the available volume in paid search is sometimes limited, and prevents you from getting to where you want to in your campaign. In other words, people only search so much on keywords related to your campaign, and there is nothing you can do with your paid search campaign that can change that. Getting at as much (profitable) volume as you can is what it ends up being all about.
Tags : 
lead volume, paid search, ppc, marin, marin software, keywords, pay per click, cost per click, cost per lead
    
Marin Software
Published By: Polaris Research, Inc     Published Date: Jun 16, 2009
Polaris Research, Inc. is a recognized leader in decomposing historical marketing results to determine ROI across the entire media landscape. Our marketing analytics and insights empower companies to optimize spending levels within and across media channels based on individual elasticity and performance to realize millions of dollars in savings. Learn more today!
Tags : 
polaris, marketing mix modeling & optimization, mmm&o, roi. return on investment, market events, elasticity, all-media, analytics, online portal, business intelligence, seo, quality-to-marketing-management-system, qtmms, loyalty, sales, media effectiveness statistic, mes, consumer confidence index, cci, forecasting
    
Polaris Research, Inc
Published By: GoToWebinar     Published Date: Nov 20, 2009
Do you know your numbers? If getting more high-quality leads from your marketing events spend is a top priority, then it pays to know the return on investment of your marketing events tactics. This new white paper explores which marketing events offer the greatest return on investment for your budget and staff. Read survey results of marketers using different types of events, and then calculate your own event costs with the marketing events ROI calculator.
Tags : 
citrix gotowebinar, online content strategy, lead generation, marketing, buyers, integration, b2b, content management
    
GoToWebinar
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, knowledge management, enterprise applications, business technology
    
BlackBerry
Published By: Cisco     Published Date: Nov 30, 2016
Nearly two-thirds of B2B marketers say online events are by far one of the most effective content marketing tactics.1 But carrying out a successful event requires some simple, yet important steps to ensure both marketers and attendees gain all of the benefits of online events, including real-time experience, engagement, and convenience. If you’re ready to produce your first online event, this 12-step checklist takes you through the entire process — from planning to post-event follow-up — to provide you with the information you need to get started. 1
Tags : 
    
Cisco
Published By: Phunware     Published Date: Jul 30, 2014
Retailers and Marketers have not yet begun to take total advantage of the newest technologies to leverage bid data and mobile. Download this whitepaper for the key best practices that will allow mobile marketers to utilize these technologies and capture a larger market share.
Tags : 
phunware, apps for sports, apps for event marketing, apps for live events
    
Phunware
Published By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencer’s holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : 
auth0, authentication, scalability, marks and spencers, authentication demand, business technology
    
Auth0
Published By: Limelight Platform     Published Date: Sep 06, 2016
This guide will allow you to prove and improve ROI/ROO, assist in defining KPIs and showcase how to best leverage digital in today’s changing experiential marketing landscape.
Tags : 
live marketing software, live lead generation, event marketing analytics, experiential marketing analytics, limelight marketing, experiential marketing software, experiential marketing, promotional events, live marketing, event marketing software, roi, roo, kpi, return on investment, analytics, data, consumer insight, events, experiences, onsite
    
Limelight Platform
Published By: IBM     Published Date: Mar 31, 2016
"Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action. "
Tags : 
ibm, ibm operational decision manager, ibm odm advanced, process improvement, business analytics, business insights
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, middleware, ibm operational decision manager, application services, networking, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications, data management, business technology
    
IBM
Published By: APTX     Published Date: Nov 05, 2009
This paper examines the key performance aspects of low bit rate audio codecs for the next generation of bandwidth-efficient digital wireless microphone systems that meet the future needs of live events.
Tags : 
aptx, bit-rate, wireless microphone, audio codec, spectrum, compression ratio
    
APTX
Published By: Brainshark     Published Date: Oct 16, 2013
Do you have a strategy specifically for video marketing? If not, you're missing out! Video has proven to be an effective means of boosting demand generation, enabling sales teams, improving PR practices, promoting upcoming events, and more. Read this E-book to get started now.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, demand generation, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video
    
Brainshark
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Compass Datacenters     Published Date: Feb 01, 2016
The world of data centers and IT has been historically been one of gradual evolution, but events and capabilities that have emerged over the past 3-5 years present both a challenge, and opportunity to the IT organization. Click here to read about the IT Metamorphosis.
Tags : 
compass data centers, data center, cloud computing, facilities management, data warehousing
    
Compass Datacenters
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Tags : 
apc by schneider electric, monitoring systems, human error, distributed server rooms, remote wiring closet, downtime
    
APC by Schneider Electric
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: Act-On     Published Date: Jan 07, 2016
People buy from people, not companies. Next to events and other face-to-face methods, social media is the best channel for building meaningful connections with your prospects. This eBook explains the five key steps to use social selling to build relationships that last, provide value, demonstrate consistency, and are mutually beneficial.
Tags : 
social media, relationship building, social selling
    
Act-On
Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept