alerts

Results 51 - 75 of 86Sort Results By: Published Date | Title | Company Name
Published By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Safeguarding your business doesn’t have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.
Tags : 
remote security, business protection, security
    
Tyco Integrated Security
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to understand how FINRA leverages Splunk with a variety of AWS services such as Amazon Kinesis Data Firehose and AWS Lambda as the data analytics destination to gain real-time insights for powerful visualizations, comprehensive reporting and meaningful alerts.
Tags : 
    
AWS
Published By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterprise’s security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods – manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems – are not keeping pace. Whatever tools and processes are in place now, there’s always the opportunity to evolve to a higher level for more accurate detection – more high-value alerts and fewer false positives.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : 
blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management
    
BlackBerry
Published By: Numara Software     Published Date: Jul 16, 2009
Find out how Numara Track-It! can help you build better processes, manage organizational knowledge and solve problems quickly. Keep issues from falling through the cracks and efficiently manage help desk requests as well as other processes that require request management: • Optimize help desk efficiency with easy to use systems • Empower customers with self service • Improve productivity with automated alerts, notifications and assignments • Reduce diagnostic time with knowledge management • Reduce resolution time with asset and work order history
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management
    
Numara Software
Published By: Numara Software     Published Date: Jul 16, 2009
Discover how Numara® Track-It!® helps you avoid unplanned service interruptions, lost revenue and customer dissatisfaction due to unmanaged change. With change management capabilities, you will have the flexibility and management tools you need.• Implement change control • Reduce time and effort while improving productivity and compliance • Leverage your IT investment with a fully integrated change management solution • Improve customer satisfaction • Adhere to best practices in IT change management • Reduce the cost of IT services
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management
    
Numara Software
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security
    
IBM
Published By: IBM     Published Date: May 04, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
IBM
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube
    
Visible Technologies
Published By: Phunware     Published Date: Oct 27, 2014
Learn how to use push notifications for application monetization and see the positive results of providing the right messages, at the right time, to the right users.
Tags : 
push notifications, geo fence, location marketing, location based alerts, imessage, cloud messaging, third party app notifications, local notifications
    
Phunware
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications
    
IBM
Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications
    
Riverbed
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee