user intelligence

Results 1 - 25 of 49Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis
    
SAS
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
FICO
Published By: SAP     Published Date: May 22, 2012
Is turning data into information still a challenge for your company? If so, you are not alone. View this on-demand Webinar with SAP and HP to learn how you can manage ever-increasing amounts of data; provide this data to business users to make critical decisions in a timely fashion; and enable true self-service business intelligence (BI) for business users.
Tags : 
sap, business solutions, business technology, enterprise, technology, enterprise analytics
    
SAP
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron
Published By: TIBCO Software     Published Date: May 31, 2018
Ask the average business user what they know about Business Intelligence (BI) and data analytics, and most will claim to understand the concepts. Few, however, will profess to know how analytics works or to have the skills needed to put it into practice. Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn’t stop them from wanting to have a go. This situation has led to ease of use and accessibility becoming the main focus for recent updates from all the leading BI vendors—but making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work. Unfortunately, the
Tags : 
    
TIBCO Software
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: Jul 05, 2016
Today's data-driven organization is faced with magnified urgency around data volume, user needs and compressed decision time frames. In order to address these challenges, while maintaining an effective analytical culture, many organizations are exploring cloud-based environments coupled with powerful business intelligence (BI) and analytical technology to accelerate decisions and enhance performance.
Tags : 
ibm, datamart on demand, analytics, cloud, hybrid cloud, business insight
    
IBM
Published By: Aternity     Published Date: Mar 15, 2016
IT and Line of Business (LOB) management need precise, comprehensive metrics describing real end user experience, before and after going “virtual”, in order to support strategic desktop virtualization and consolidation decisions.
Tags : 
application virtualization, monitoring, strategic applications, best practices, network provisioning, network infrastructure, end user experience, business intelligence
    
Aternity
Published By: SAP     Published Date: Jul 18, 2016
To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. Read the white paper to discover panelists’ insights on cloud-based analytics, business intelligence strategies, and implementation practices.
Tags : 
    
SAP
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: Bronto     Published Date: May 31, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
trends, ecommerce, marketing, strategy
    
Bronto
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: TIBCO Software     Published Date: Oct 03, 2018
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today's market. Now there has been a shift away from these "black box" applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
artificial intelligence, machine learning, dynamic pricing, predictive claims, real-time fraud, contextual customer experience, operational effectiveness
    
TIBCO Software
Published By: AWS     Published Date: Nov 15, 2018
It isn’t always easy to keep pace with today’s high volume of data, especially when it’s coming at you from a diverse number of sources. Tracking these analytics can place a strain on IT, who must provide the requested information to C-suite and analysts. Unless this process can happen quickly, the insights grow stale. Download your complimentary ebook now to see how Matillion ETL for Amazon Redshift makes it easy for technical and business users alike to participate and own the entire data and analysis process. With Matillion ETL for Amazon Redshift, everyone from CTOs to marketing analysts can generate valuable business intelligence by automating data and analytics orchestrations.
Tags : 
    
AWS
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user.CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel® -like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools. Today, CA PPM provides financial managers with the ability to visualize, manage and take advantage of data like never before—all from inside the solution.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: • Unparalleled application visibility and invaluable operational intelligence; • Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; • An optimized user experience that drives greater employee productivity and customer satisfaction; • Increased assurance that governing SLAs will always be met; and, • Reduced total cost of ownership, based on having a low-cost, low-impact solution—particularly compared to traditional
Tags : 
application visibility, netscaler insight center, optimized user experience, low cost, citrix
    
Citrix NetScaler
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity, user-centric proactive it management, slas
    
Aternity
Published By: Aternity     Published Date: Jul 20, 2012
Read in only 5 pages about how Global 2000 organizations are monitoring end user behavior in physical and virtual desktop environments with Aternity's Frontline Performance Intelligence Platform. Monitor the Cloud, drive SLAs, Citrix/VDI monitoring, and much more.
Tags : 
technology, help desk, management, it management
    
Aternity
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Read how your business can gain that advantage by delivering the type of mobile experience users have come to expect, from Michael Finneran of dBrn Associates and Brad Herrington of Interactive Intelligence.
Tags : 
mobile customer service, customer service, mobile experience, mobile apps
    
Interactive Intelligence
Previous   1 2    Next    
Search Offers      
Get your company's offers in the hands of targeted business professionals.