adaptive analytics

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Pega     Published Date: Aug 12, 2016
Savvy marketers need savvy solutions. Pega Marketing is a customer-centric marketing solution that leverages predictive and adaptive analytics to provide real-time marketing offers and treatments that help drive customer lifetime value. A Forrester Consulting study found that Pega Marketing achieved an overall Return On Investment (ROI) of 438%, and more than $64 million in incremental sales. Download the Forrester Total Economic Impact™ Study to fully understand how Pega Marketing helps improve customer retention, drives incremental sales, and creates across-the-board efficiencies.
Tags : 
pega, savy marketers, savy solutions, return on investment, incremental sales
    
Pega
Published By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : 
analytics, big data, forrester
    
Riverbed
Published By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : 
    
BMC Software
Published By: BMC Software     Published Date: Jul 22, 2015
The rise of the digital enterprise has created an explosion of valuable, yet unharnessed data for IT organizations. Traditional IT tools and processes, founded on the notion of control and management, are unable to support the speed and agility requirements of the digital enterprise. IT organizations must reengineer their approach from traditional analytics and reporting to adaptive, real-time digital service analytics.
Tags : 
operations analytics, digital enterprise, data, data management, service analytics
    
BMC Software
Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: IBM     Published Date: May 19, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, software vendors, software, enterprise applications, business technology
    
IBM
Published By: SAP     Published Date: Nov 04, 2015
Download this whitepaper to discover how global companies are using innovative technologies such as beacons, dynamic pricing and adaptive analytics to flourish in the modern-day, next-generation retail world. Learn what they believe they’re doing well and where they’re struggling as they adapt to today’s rapidly evolving marketplace. These insights can help your business thrive in an increasingly disruptive retail landscape.
Tags : 
consumer behaviors, sap, dynamic pricing, beacons, adaptive analytics, marketplace, fulfillment, customer experience
    
SAP
Published By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, networking, software development, enterprise applications
    
IBM
Published By: Forcepoint     Published Date: Jan 03, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 29, 2019
Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful cybersecuritystrategy. In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, discusses how to take a risk-first approach to addressing information security. Specific topics include:- How to define cybersecurity success; - Common approaches that fall short; - Risk-based cybersecurity strategy planning. Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
Tags : 
risk-adaptive, carta, data protection, data security, critical data, intellectual property, dlp, cloud apps, cyber security, cybersecurity, analytics, data loss prevention, data leak prevention, compliance, dynamic, risk adaptive, gdpr security, data centric security, risk, cro
    
Forcepoint
Published By: IBM     Published Date: Apr 15, 2016
As business grows more digital, the hunger for faster, more adaptive delivery of BI and analytics will increase. Read this Gartner paper and see how to give your business what it needs.
Tags : 
ibm, business analytics, business intelligence, agile, decision making, business technology
    
IBM
Published By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : 
big data analysis, it analytics, manage, complex, automation, monitoring, management strategy, networking, it management
    
Riverbed
Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee