Data Analytics

RSS Feed    Add to Google    Add to My Yahoo!
Data Analytics Reports
226 - 250 of 1547 Matches Previous Page  |  Next Page
Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

High Performance Analytics Tools: Bringing Speedier Data Processing to Businesses
sponsored by SAP
EGUIDE: This e-guide lays out the basics on what faster analytics processing systems can do for organizations. Discover the benefits brought on by these tools, including higher volumes of operational and transactional data, which is processed in real time.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

SAP

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worst threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Magic Quadrant for Data Quality Tools
sponsored by Information Builders
RESOURCE: According to Gardner, by 2017 33% of Fortune 100 companies will experience an information crisis due to their inability to effectively govern and trust their enterprise information—Will you let this happen to your business?Find out how you can effectively manage your data to ensure quality analytic results with this Magic Quadrant report.
Posted: 24 Mar 2015 | Published: 26 Nov 2014

Information Builders

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics
sponsored by IBM
WHITE PAPER: Along with the steady increase in urbanization, city officials are scrambling to implement secure infrastructures of video surveillance. The following white paper examines how analytic and data management systems help cities stay on top of security.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

IBM

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Log Management Fundamentals
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Exploiting Innovative Technologies in BI and Big Data Analytics
sponsored by SAP
WHITE PAPER: This infographic illustrates the results of a recent Forrester survey of 330 global BI decision-makers that explored the link between business success and the adoption of innovative BI, analytics, and big data tools.
Posted: 16 Mar 2015 | Published: 30 Dec 2013

SAP

Big & Fast Data: The rise of insight-driven business
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from Capgemini and EMC, which surveyed more than 1,000 C-suite and senior decision makers around the world, looks at enterprise readiness for big data.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

ComputerWeekly.com

Should You Take the Road to SAP HANA?
sponsored by SAP
EGUIDE: This e-guide highlights several points that businesses should carefully consider before employing SAP HANA, including ROI calculations, relevant use cases, and the skills required to successfully deploy this technology.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

SAP

Leveraging the Cloud for Your Big Data Workloads
sponsored by IBM
WHITE PAPER: This brief white paper gives you a rundown on what you should consider when choosing a cloud service partner.
Posted: 12 Mar 2015 | Published: 31 Jul 2014

IBM

Learn what to include in a proactive threat management program
sponsored by Alert Logic
WHITE PAPER: This handy resource gives you the ten steps to successful threat management.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Unifying Supplier and Customer Data for Manufacturing Analytics
sponsored by GT Nexus
EGUIDE: In this expert e-guide learn more about how your data management tools could be hindering your analytic capabilities and the benefits you could gain by stepping up your business intelligence systems.
Posted: 04 Mar 2015 | Published: 11 Mar 2015

GT Nexus

BI in the Sky: Making Cloud Analytics Work
sponsored by SearchBusinessAnalytics
EBOOK: Cloud BI offers companies many advantages. Find out if those benefits apply to your organization.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchBusinessAnalytics

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Blue Cross Blue Shield of Massachusetts Deploys High Performance Analytics
sponsored by IBM
CASE STUDY: This case study describes how Blue Cross Blue Shield of Massachusetts applies business intelligence and analytics tools to reach their target of utilizing nearly 90% of every premium dollar received to pay the medical expenses of its members.
Posted: 03 Mar 2015 | Published: 31 May 2013

IBM

Predictive Analytics Helps a Hospital Raise Collections Revenue by 12 Percent
sponsored by IBM
CASE STUDY: This case study describes how predictive analytics helped one hospital to optimize the payment collections process and maximize returns from self-pay patients.
Posted: 03 Mar 2015 | Published: 28 Feb 2014

IBM
226 - 250 of 1547 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement