discovery

Results 51 - 75 of 342Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Jan 29, 2020
Multi-cloud is quickly becoming the deployment standard as organizations leverage an ever-increasing variety of cloud computing services. The ServiceNow platform has evolved as the de-facto standard for managing IT Ops business use cases. Read this White Paper to learn how to set up Cloud Discovery, visualize results and get monthly updates on new pattern content.
Tags : 
    
ServiceNow
Published By: TIBCO Software     Published Date: Aug 13, 2018
TIBCO Spotfire is the premier data discovery and analytics platform, which provides powerful capabilities for our customers, such as dimension-free data exploration through interactive visualizations, and data mashup to quickly combine disparate data to gain insights masked by data silos or aggregations.
Tags : 
    
TIBCO Software
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
US Based multinational technology conglomerate were having too many business critical incidents and lot of manual efforts. Leveraging LTI’s Mosaic Discovery solution various issues were detailed out accordingly to identify impacting business processes. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Qlik     Published Date: Aug 12, 2015
This Research Report examines the analytical strategies of organisations currently using data discovery tools and highlights their superior performance in user engagement.
Tags : 
data discovery, data, data discovery tools, analytics, benefits of using data discovery, data collaboration, data proliferation, data engagement
    
Qlik
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: HashiCorp Q1-20     Published Date: Jan 17, 2020
Enterprises thriving in the multi-cloud era compete on speed to market. The development team is taking the cloud-native approach to launch new features faster. Companies are inspired by successful early adopters, like Netflix and eBay, but they often forget about the new challenges that come with modern application development and cloud adoption. The cloud operating model is composed of four distinct layers, mapping to the personas and functional areas in IT. The challenges for supporting distributed applications at the networking layer are often one of the most difficult aspects. This white paper will examine the shortcomings of traditional networking approaches and introduce service discovery, a modern approach that we consider an essential part of multi-cloud service networking.
Tags : 
    
HashiCorp Q1-20
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
While many organizations have acknowledged the importance of digitally transforming their businesses and processes to deliver speed and agility, most are just starting their cloud journey. Cloud-in-a-Box delivers an enterprise cloud platform with a mix of on- and off-premises private cloud and public cloud, with orchestration between them. This will provide the organization with the ability to avoid vendor lock-in, find the optimal cloud services for a particular business or technical need, and increase redundancy. Download IDC Infobrief on “Cloud-in-a-Box” to understand: • How you can deliver the different functions of a data center and meet business requirements by deploying a “Cloud-in-a-Box.” • Understand how industries such as financial services, manufacturing and healthcare can benefit from “Cloud-in-a-Box” technology. • Self-discovery questions and focus areas that every organization needs to go through for successful cloud deployment.
Tags : 
    
Lenovo - APAC
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management, data management
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
cyber threat, cyber defenses, security intelligence, malware discovery, security, it management, knowledge management
    
Kaspersky Lab
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance
    
mindSHIFT
Published By: iGoDigital     Published Date: Feb 26, 2013
It’s a marathon and a sprint. Learn how to capture your customer’s interest from the beginning while continuing to add value from discovery through post-purchase.
Tags : 
ecommerce personalization, ecommerce personalization software, ecommerce personalization solutions, ecommerce recommendations engine, online shopping personalization, personalized ecommerce, personalized product recommendations, personalized online shopping
    
iGoDigital
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science
    
Waterline Data & Research Partners
Published By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
    
Rackspace
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : 
mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi
    
IBM Watson Health
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Lucidchart     Published Date: Nov 28, 2018
Does it take forever for your sales team to close deals? There’s a potential roadblock you may have missed: your internal sales communication. Take a look around—new sales reps are overwhelmed with processes and messaging during onboarding, your sales reps don’t pass discovery information off to sales engineers or customer support, and you aren’t always sure where deals stand, which makes it rather difficult to predict pipeline. If the members of your org aren’t completely aligned, you can’t take a prospect across the finish line or keep the org running smoothly. Download this eBook to see how visuals can solve these communication breakdowns and align your sales organization to close bigger and faster.
Tags : 
    
Lucidchart
Published By: AppsFlyer     Published Date: May 27, 2020
Gaming app marketers, it’s time to take a deep dive into the world of mobile measurement and learn how to let data work for you. Let us be clear: relying on organic discovery among hundreds of thousands of games in the stores is like thinking you can win the lottery.
Tags : 
    
AppsFlyer
Published By: Veritas     Published Date: Dec 08, 2016
Read on to find out how to unlock yout data's value
Tags : 
data, data management, cost, data discovery
    
Veritas
Published By: Teradata     Published Date: May 02, 2017
Kylo overcomes common challenges of capturing and processing big data. It lets businesses easily configure and monitor data flows in and through the data lake so users have constant access to high-quality data. It also enhances data profiling while offering self-service and data wrangling capabilities.
Tags : 
cost reduction, data efficiency, data security, data integration, financial services, data discovery, data accessibility, data comprehension
    
Teradata
Published By: LexisNexis     Published Date: Mar 25, 2013
In this case study, Beasley Allen saves $100,000 in E-Discovery costs on one case with the use of LAW PreDiscovery. Learn how it delivers the fastest return of investment of any software product the firm has acquired by use in one litigation matter.
Tags : 
beasley allen, law prediscovery costs, save, civil litgation costs
    
LexisNexis
Published By: LexisNexis     Published Date: Mar 25, 2013
In 2010, Murphy & King recognized they needed to hire an experienced litigation support manager to assist the firm's growing litigation practice. Learn how they reduced client's expenses, increased profitability and obtained quality with E-Discovery.
Tags : 
client expenses, increases profitability, expenses, e-discovery, lexis nexis
    
LexisNexis
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.