it analyst

Results 201 - 225 of 331Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 22, 2018
Some organizations have formal security operations centers (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year. The analysts are checking their organization’s enterprise security controls to identify possible signs of intrusion and compromise that may require a response by the organization’s incident responders.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Any single approach to security monitoring cannot satisfy all requirements. Security analysts need a set of complementary technologies which can coexist.
Tags : 
security analytics, advanced threats, uba, security monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox, honeypot, siem, stix
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: Amazon     Published Date: Nov 07, 2013
Until recently, it has been far cheaper and easier to produce and store data than to process it. Companies have the option to buy large, multi-million dollar hardware devices to process their big data, but with budgets under pressure and no clear way to calculate returns on investment, the business case is difficult to make… And when analysts explain to the CTO that they only need the hardware for six months, for one day a week, or for one hour a day, the investment becomes impossible to justify. In this whitepaper, you’ll learn how by eliminating the traditionally high ‘cost of entry’ for big data analysis, Amazon Web Services is enabling customers to convert more raw data into more valuable business insight.
Tags : 
amazon web services, aws, aws cloud, cloud services, cloud computing, big data, data management, data analysis, insights, customer sentiment, big data analysis
    
Amazon
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: AT&T     Published Date: Nov 07, 2011
See how others are using communications enabled business processes (CEBP) to drive their business into the fast lane.
Tags : 
unified communication, cebp, communication, collaboration, collaboration capabilities, critical business processes, applications, efficiency, at&t, att, at+t, advantages, analysts, business processes
    
AT&T
Published By: QuinStreet     Published Date: Feb 09, 2009
Between cost savings and the efficiency of a converged voice-data network, VoIP presents an attractive case for shoring up business communications expenses in a down economy.The VoIP value proposition is so strong that industry analysts are anticipating continued growth in IP telephony through 2009.
Tags : 
quinstreet, voip, voice-data network, business communications, recession
    
QuinStreet
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security
    
Trend Micro, Inc.
Published By: Five9     Published Date: Aug 16, 2013
Six out of ten contact centers projected to have a cloud-based contact center deployed by the end of 2013. Why? Ultimately, because it will help them be more responsive to their customers, without the prohibitive costs of carrying enough premise-based technology to cover demand spikes. In this concise analysis of two recent contact center executive surveys, Aberdeen Group analysts discuss how cloud-based infrastructure enables contact centers to excel in key activities including center activity reporting, agent performance feedback and more.
Tags : 
cloud, roi, contact center, crm, solution, technology, premise-based
    
Five9
Published By: TIBCO     Published Date: May 15, 2013
According to Forrester, most organizations today are only using 12% of their available data and only 37% of organizations are planning some type of big data technology project. At a time when companies are seeing volume of information increase quickly, it’s time to take a step back and look at the impact of big data. Join Mike Gualtieri, Principal Analyst at Forrester, for this webcast exploring the importance of integration in your big data initiatives. Discover how your ability to operate, make decisions, reduce risks and serve customers is inextricably linked to how well you’re able to handle your big data. Continue on to gain insight into: •3 key big data management activities you need to consider •Technologies you need to create for your big data ecosystem •A multi-dimensional view of the customer is the holy grail of individualization •Overcoming key integration challenges And more!
Tags : 
big data, integration, architecture, database, data warehousing, operations management
    
TIBCO
Published By: Jobvite     Published Date: May 15, 2013
Can you directly link your recruiting sources to successful employee performance? Don’t worry. Only 22% of organizations claim to have mastered this skill, according to a recent Analyst Insight report from Aberdeen Group. Download your report now.
Tags : 
new hires, jobvite, recruiting, job placement, job recruiting, new staff, staffing, hire management, hiring tools, social hiring, social recruiting
    
Jobvite
Published By: Box     Published Date: Nov 09, 2014
Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs
Tags : 
box, content file sharing, collaboration, content sharing, mobile workforce, cloud computing, cloud storage
    
Box
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: SAP     Published Date: Apr 14, 2011
A research report from Business Week on a global survey of executives on Customer Experience; 80% of respondents rate CE as a strategic priority but the majority believe that their company does a poor job at delivering a good customer experience. We will be publishing 4 reports based on this survey as well as interviews with key analysts, influencers and Customers. Here is the first report which you can download and forward to your sales team and customers.
Tags : 
customer experience management, bloomberg businessweek, bbrs, relationship management, customer segmentation, customer retention
    
SAP
Published By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 26 pages and is based on the experiences of 319 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 47 technology solution providers.
Tags : 
gleanster, marketing, email marketing, personalization, b2b, customers, email campaigns, web analytics, customer experience/engagement, business intelligence, email marketing services/software
    
Gleanster
Published By: Gleanster     Published Date: Mar 14, 2012
B2B marketers operate in a world where the ability to dynamically serve up relevant website content at the so-called "moment of truth" has traditionally presented a monumental challenge. This 8-page Deep Dive analyst report explores the promise of what Gleanster terms Real-time Website Content Versioning.
Tags : 
gleanster, marketing, b2b, market research, lead generation, traditional marketing, business intelligence, data management/analytics, lead generation & automation
    
Gleanster
Published By: OnForce     Published Date: Feb 19, 2008
Discover how you can find highly qualified contract IT service professionals with the skill sets you need, when and where you need them, on demand. Get the free white paper, “8 Ways On-Site Services Can Drive Revenue Now,” featuring commentary from industry analysts and leaders like Gartner, IDC and CRN.
Tags : 
crn, reseller, retailer, service, vendor selection, onforce, on force, var, var business, varbusiness
    
OnForce
Published By: SAS     Published Date: Mar 14, 2014
This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, measured value, emergent patterns, quality metrics, potential classifications, data analyst, scorecard, reporting the scorecard, improve scorecard, business process
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
This paper will consider the relevance of measurement and monitoring – defining inspection routines, inserting them into the end-to-end application processing, and reporting the results.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, measured value, emergent patterns, quality metrics, potential classifications, data analyst, scorecard, reporting the scorecard, improve scorecard, business process
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.