event data

Results 226 - 250 of 293Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Nov 16, 2018
Medicaid fraud is prevalent, costly and difficult to prevent. With a combination of more integrated data and advanced analytics, state agencies can turn the tables on fraudsters. They can accelerate the transition from detection to prevention, as new forms of fraud are recognized faster and fewer improper payments go out the door. This IIA Discussion Summary explores the challenges and opportunities in preventing Medicaid fraud in an interview with SAS’ Ellen Joyner-Roberson, Principal Marketing Manager for Fraud and Security Intelligence, and Victor Sterling, Principal Solutions Architect.
Tags : 
    
SAS
Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption
    
SilverSky
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn how to properly assess the security needs for your organization and see what areas your team needs to focus its attention on in order to protect your data.
Tags : 
data breaches, protection, free assessment tool, prevent data breaches, avoid costs
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn why it is crucial to protect against data breaches and see how you can save your company from potential risks by taking the right steps to avoid breaches and maintain your organization’s reputation.
Tags : 
data breaches, protection, video, prevent data breaches, avoid costs
    
HP Enterprise Services
Published By: Altiscale     Published Date: Aug 25, 2015
Weren't able to attend Hadoop Summit 2015? No sweat. Learn more about the latest Big Data technologies in these technical presentations at this recent leading industry event. The Big Data experts at Altiscale - the leader in Big Data as a Service - have been busy at conferences. To see all four presentations (in slides and youtube video), click here. https://www.altiscale.com/educational-slide-kit-2015-big-data-conferences-nf/ • Managing Growth in Production Hadoop Deployments • Running Spark & MapReduce Together in Production • YARN and the Docker Ecosystem • 5 Tips for Building a Data Science Platform
Tags : 
hadoop, hadoop technologies, hadoop information
    
Altiscale
Published By: Basho     Published Date: Apr 07, 2015
This whitepaper looks at why companies choose Riak over a relational database. We focus specifically on availability, scalability, and the key/value data model. Then we analyze the decision points that should be considered when choosing a non-relational solution and review data modeling, querying, and consistency guarantees. Finally, we end with simple patterns for building common applications in Riak using its key/value design, dealing with data conflicts that emerge in an eventually consistent system, and discuss multi-datacenter replication.
Tags : 
basho, riak, relational database, nosql, common applications, simple deployments
    
Basho
Published By: Adecco     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, connectivity, personal data, information, internet of things
    
Adecco
Published By: SurveyMonkey     Published Date: Oct 26, 2015
Check out our latest on-demand webinar with Eventbrite’s Global Director of Metro Marketing, Eric Meyerson, to hear how Eventbrite successfully uses data to track brand awareness and monitor the competition.
Tags : 
surveymonkey, customer experience, customer care, reputation, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing, sales
    
SurveyMonkey
Published By: Limelight Platform     Published Date: Sep 06, 2016
This guide will allow you to prove and improve ROI/ROO, assist in defining KPIs and showcase how to best leverage digital in today’s changing experiential marketing landscape.
Tags : 
live marketing software, live lead generation, event marketing analytics, experiential marketing analytics, limelight marketing, experiential marketing software, experiential marketing, promotional events, live marketing, event marketing software, roi, roo, kpi, return on investment, analytics, data, consumer insight, events, experiences, onsite
    
Limelight Platform
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships
    
IBM
Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices
    
SAS
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
    
Q1 Labs
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage, data protection, edit shared files
    
Nativeflow
Published By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : 
hewlett packard, cloud, mobile, remote, data recovery, disaster, failure
    
HP
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to discover, monitor and protect your sensitive information to maximize the efficiency of your data management and see how you can greatly improve your data loss prevention.
Tags : 
security, data loss prevention, data management, monitor and protect, data efficiency
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Published By: Special Counsel     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, personal data, information, connectivity, innovation, internet of things
    
Special Counsel
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Confio     Published Date: Aug 21, 2009
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance.
Tags : 
database, oracle, oracle database, database administrator, resource mapping, resource management, rmm, database performance, performance optimization, ignite for oracle, confio ignite, confio
    
Confio
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.