intelligence

Results 1 - 25 of 2094Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Intapp     Published Date: May 20, 2019
Pricing matters and engagements accurately and profitably poses a challenge to many firms. However, developing effective pricing strategies has become more important than ever, as clients demand more transparency and alternative fee arrangements become more popular. Technology can help law firms develop both tactical and strategic approaches to pricing. Download this ebook from Intapp, a leading provider of business applications for professional services firms, to learn how an AI-enabled approach to pricing can help your firm: • Price matters more accurately and profitably • Scope and resource matters to ensure better margins • Monitor engagements as they proceed and track budget to actuals • Improve client relationships with more transparency, accountability, and success
Tags : 
pricing, profitability, alternative fees, artificial intelligence, engagement monitoring, professional services, legal
    
Intapp
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE, the leader in workforce management, introduces the most advanced forecasting tools on the market with WFM 7.0. Building on its recognition as the industry standard, NICE WFM 7.0 Forecasting with Artificial Intelligence chooses the optimal daily forecast model to provide staffing levels and budgeting that are more accurate than those delivered by any other WFM solution.
Tags : 
    
Nice Systems
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: IBM APAC     Published Date: Jun 24, 2019
Your security products send alerts when a cyber attack strikes. Your incident response plan tells you what to do to block the attacker’s action and recover normal operations. But do you know how or where the attacker was able to get into your environment? Do you understand the tactics, techniques and procedures the attacker used? In short, to move to the next level of security, organizations need a way to both understand and manage threat intelligence. Because an organization that can uncover the context of a threat can also better respond to it. Learn more about the impact of security threats from this whitepaper. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: Intel     Published Date: May 22, 2019
Please note that this piece of content is in local language. This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel® Silicon Photonics can meet demanding bandwidth requirements.
Tags : 
    
Intel
Published By: Intel     Published Date: Jun 18, 2019
This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel® Silicon Photonics can meet demanding bandwidth requirements
Tags : 
    
Intel
Published By: Oracle     Published Date: Mar 08, 2019
Did you know that organizations with advanced finance teams are more likely to have a compelling digital customer experience? The driver behind this trend? A digital, customer-first way of working with greater investment in talent, innovation, and advanced technologies such as artificial intelligence (AI) and machine learning (ML). While finance has long taken advantage of technology to help drive productivity and collaboration, the goalposts have recently moved. Today’s organizations must adopt an agile finance operating model— powered by emerging digital technologies and skillsets—to better support the demands of an economy driven by continuous innovation.
Tags : 
    
Oracle
Published By: CheckMarx     Published Date: Jun 07, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
Published By: Mist Systems     Published Date: Jun 19, 2019
For centuries, new technologies have ushered in entirely new eras of progressive change in all facets of life, and have revolutionized countless industries. The invention of the steam engine brought about the industrial revolution and expanded trade and transportation. Quantum physics was the foundation of the electronics revolution that brought us transistors, TV, radio, and computers. And the Internet has brought about a stunning information and communication revolution, which is still sending shock waves across virtually every industry, and to the very core of our cultures and lifestyles.
Tags : 
    
Mist Systems
Published By: Mist Systems     Published Date: Jun 19, 2019
Download for a simplified look at an Automated intelligence Driven Enterprise
Tags : 
    
Mist Systems
Published By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
    
Mimecast
Published By: Recorded Future     Published Date: Apr 18, 2019
Supercharge Your Security Alert fatigue is the desensitization that comes from being bombarded with too many alerts — a sense of hopelessness from being overwhelmed by tasks and not knowing where to begin. If an overabundance of security alerts is tiring you out, check out our new e-book, “5 Ways to Supercharge Your Security With Threat Intelligence.” It shows exactly how to use threat intelligence to get the context you need to do something with all that data.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics, business analytics, business process management, analytical applications
    
SAP
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence, application integration, application performance management, business integration, business management, business process automation, business process management, system management software
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence, application integration, best practices, business integration, business process automation, business process management, enterprise software, hipaa compliance
    
ASG Software Solutions
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, website development, networking, it management, knowledge management
    
Adlib Software
Published By: OneSource     Published Date: Dec 08, 2010
Have you received your quota for 2011 yet? Wondering how you are going to hit it?as
Tags : 
webinar, onesource, business intelligence, prospects, lead generation, lead generation & automation
    
OneSource
Published By: Information Builders     Published Date: Sep 24, 2008
Business Intelligence helps retailers, warehouse staff, customer services agents, and your value chain realize new innovations, improve margins, and propel profits to new heights. Learn how Ace Hardware, Food Lion, and others leverage our software.
Tags : 
information builders, infobuilders, business intelligence, soa, roi, crm, marketing value, crm solutions/software, customer experience/engagement, e-commerce solutions
    
Information Builders
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.