rsa

Results 151 - 175 of 575Sort Results By: Published Date | Title | Company Name
By: Dun & Bradstreet     Published Date: Nov 13, 2017
You’re on the hook for more than just moving prospects through the funnel and delivering leads to sales. You’re responsible for managing the customer relationship. But how does it feel to the customer when that transition takes place? All too often, the first contact with sales feels like starting the conversation over again. And for customers who have already invested time and energy learning about a company and their products, this can be a jarring experience. Great composers use consistent melodic themes over the course of a piece. As marketers, it is our responsibility to ensure there is harmony and consistency over the full lifecycle of the customer relationship. But linking the conversations that marketing and sales have with prospects depends on your ability (and willingness) to share insights that are born from data.
Tags : data, sales, marketing, relationship management, suppliers, customers, finance, compliance
     Dun & Bradstreet
By: IBM     Published Date: Apr 01, 2016
Read the eBook to: 1) Expand what you know about Big Data; 2) Learn about the Big Data Zones Model that brings a new approach to managing data, faster to deploy, faster to insights and with less risk; 3) Gain confidence in your Big Data projects and learn about the importance of governance in a Big Data world
Tags : ibm, ibm connect, big data, big data zones model, data management
     IBM
By: IBM     Published Date: May 09, 2017
DB2 delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and ease-of-use.
Tags : db2, linux, unix, hybrid cloud, cloud solutions, enterprise data
     IBM
By: IBM     Published Date: Jul 06, 2017
DB2 is a proven database for handling the most demanding transactional workloads. But the trend as of late is to enable relational databases to handle analytic queries more efficiently by adding an inmemory column store alongside to aggregate data and provide faster results. IBM's BLU Acceleration technology does exactly that. While BLU isn't brand new, the ability to spread the column store across a massively parallel processing (MPP) cluster of up to 1,000 nodes is a new addition to the technology. That, along with simpler monthly pricing options and integration with dashDB data warehousing in the cloud, makes DB2 for LUW, a very versatile database.
Tags : memory analytics, database, efficiency, acceleration technology, aggregate data
     IBM
By: Oracle     Published Date: May 20, 2019
L’équipe financière en tant que partenaire de l’entreprise Rapprocher l’équipe financière du reste de l’entreprise est une initiative séduisante. Mais permettre aux contrôleurs de gestion de servir de porte-paroles aux autres services est bien plus qu’une réattribution des rôles. Ce nouveau guide NetSuite aide les responsables financiers d’entreprises en croissance à explorer les tenants et les aboutissants des échanges transversaux.
Tags : 
     Oracle
By: Oracle     Published Date: Mar 01, 2019
Join Oracle’s Director CX Strategy EMEA Director, Harald Behnke and Daryn Mason, Independent Customer Experience Leader, as they list their top three hyped technologies, and discuss innovations such as conversational Interface, AI and IoT.In particular, customer experience is all about personalised intelligence at scale, and IoT connects product to Front Office with convenient new options. Find out what’s happening in customer experience across the globe, and get inspired by the smart revolution.
Tags : 
     Oracle
By: Cisco     Published Date: Jun 24, 2015
This paper explores how responsive and programmable infrastructure helps IT leaders succeed.
Tags : sdn, software defined networking, networking, automation, it leaders, infrastructure
     Cisco
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : cyber attacks, live, virtual, security, analytics, ecat
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : cyber attacks, live, virtual, security, analytics, ecat
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : cyber attacks, virtual, security, analytics, ecat
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : security, analytics, incidents, ecat, logs
     EMC Corporation
By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : security, analytics, incidents, ecat, logs
     EMC Corporation
By: Citrix     Published Date: Nov 09, 2012
Cloud is a rapidly emerging necessity in IT. Relied upon the world's largest enterprise data centers and cloud networks, NetScaler is universally recognized as an outstanding application delivery controller. Learn how NetScaler beats the competition.
Tags : citrix, adc, application delivery controllers, citrix netscaler, cloud, cloud computing
     Citrix
By: RSA Security     Published Date: Oct 24, 2013
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : rsa, emc, enterprise strategy, big data, security, security analytics
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : rsa, emc, security, operations center, threat, threat detection, intelligence-driven
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : rsa, emc, big data, security, security analytics, scale, security management
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : rsa, emc, secuirty, warning, threat, analytics, security
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Tags : rsa, emc, security, analytics, siem, security visibility
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : rsa, emc, security, analytics, architecture, data
     RSA Security
By: RSA Security     Published Date: Oct 24, 2013
Mid-size enterprises face the challenges of managing advanced threats plus staff and budget constraints. This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Tags : rsa, emc, threat, analytics, intelligence, threat detection, security
     RSA Security
By: RSA Security     Published Date: Jan 07, 2014
Watch this on-demand webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. Understand why organizations are moving to a true big data security platform where compliance is a byproduct of security, not the other way around.
Tags : security analytics, siem, advanced threats, best practices, security visibility, log collection, security
     RSA Security
By: RSA Security     Published Date: Jan 07, 2014
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Tags : security analytics, siem, advanced threats, best practices, security visibility, log collection
     RSA Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com