Behaviour Analysis Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Behaviour Analysis Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Data Security
 •   Network Security
 •   Statistical Data Analysis
 •   Customer Information Management/ Customer Databases
 •   Security Monitoring
 •   Data Mining
 •   Customer Experience Management (CEM)
 •   Application Security
 •   Databases

Related Searches
 •   Balancing Behaviour
 •   Behaviour Analysis Database Reviews
 •   Benefits Of Behaviour Analysis Database
 •   Diagrams Behaviour Analysis
 •   Display Behaviour Analysis Database
 •   Forms Behaviour Analysis
 •   Solution Behaviour Analysis
 •   Spreadsheets Behaviour
 •   Supply Behaviour Analysis Database
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 31, 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 14, 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

E-Guide: Social Analytics: Opportunities and Challenges by IBM

December 21, 2012 - (Free Research)
Read this e-guide to learn how social media analytics can help businesses improve marketing by quantifying customer value at different stages of the life cycle, but also that they need tools like in-memory computing to provide real-time analysis of vast volumes of customer behavior data. 
(EGUIDE) READ ABSTRACT |

Predictive Security Intelligence for Retail Organizations by Q1 Labs, an IBM Company

February 24, 2012 - (Free Research)
This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management. 
(WEBCAST) READ ABSTRACT |

Leverage Security Intelligence for Energy and Utilities Companies by IBM

July 31, 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Energy and Utilities Companies by IBM

July 31, 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Achieving Business Value with Network and Application Visibility by Riverbed Technology, Inc.

April 01, 2010 - (Free Research)
IDC conducted nine in-depth interviews with current Riverbed Cascade customers in order to obtain qualitative information about the end-user experience since deploying the network and application visibility solution, and obtain quantifiable data specific to each customer. Read this analyst report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

High Availability and Disaster Recovery Features in Microsoft® Exchange Server 2007 SP1 by Dell, Inc.

August 2008 - (Free Research)
This paper discusses the Exchange Server 2007 Service Pack 1 complements Exchange Server 2007 by enhancing the operational performance of high availability features, adding disaster recovery options and adding support for Windows Server® 2008. 
(CASE STUDY) READ ABSTRACT |

SearchBusinessAnalytics.com eGuide: Improving customer loyalty with analytics by IBM

September 2011 - (Free Research)
In this expert e-guide, learn best practices for using in-database predictive analytics to increase customer satisfaction and retention. 
(EGUIDE) READ ABSTRACT |

Big Data Analytics by Kognitio

December 2011 - (Free Research)
Big data analytics can help you understand the current state of your business, track customer behavior, and take advantage of new opportunities. This comprehensive TDWI best practices report gives you in-depth insights into all the important aspects of big data analytics, so that you have a solid foundation for implementing an analytics plan. 
(WHITE PAPER) READ ABSTRACT |

RSA Web Threat Detection - Innovative and Effective Online Threat Detection by RSA, The Security Division of EMC

January 2014 - (Free Research)
This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Customer You Know: Keeping, Leveraging, and Profiting from Current Customers with Business Analytics by SAS

May 2010 - (Free Research)
Read this paper to learn about business analytics and how it can significantly impact customer service improvements and customer retention and how it can enable your company to develop more agile strategies that will allow you to adapt to changing customer behavior and achieve their business goals. 
(ANALYST REPORT) READ ABSTRACT |

The Next Generation of CRM - Engaging with the Empowered Customer in Turbulent Times by SAP America, Inc.

March 2009 - (Free Research)
This Webcast and complimentary Podcast explores today's consumer trends and new customer strategies that will help companies not only survive the current economy but emerge as a leader in the long run. 
(WEBCAST) READ ABSTRACT |

Heuristic Analysis- Detecting Unknown Viruses by ESET

February 2010 - (Free Research)
The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis. 
(WHITE PAPER) READ ABSTRACT |

Change app behavior: From in house to the cloud by IBM

March 2011 - (Free Research)
When moving applications to the cloud, it is critical to have a proactive migration strategy to ensure they perform the same in this environment as they do in house. This white paper provides best practices to follow to ensure a seamless transition for all your applications without compromise. 
(WHITE PAPER) READ ABSTRACT |

Oracle: Big Data for the Enterprise by Oracle Corporation

December 2011 - (Free Research)
By using the Oracle big data appliance with Oracle Exadata, enterprises can acquire, organize and analyze all their enterprise data to make the most informed decisions. 
(WHITE PAPER) READ ABSTRACT |

Unlock the Value of Social Media Data by Hewlett-Packard Company

May 2012 - (Free Research)
Social media data is extremely valuable for businesses, but it doesn't mean anything if you don't have the right tools and processes in place to make sense of it all. In this resource, discover a new approach to business intelligence that responds to the unique analytic challenges of social media data. 
(WEBCAST) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Splunk for Business Analytics by Splunk

April 2012 - (Free Research)
This paper looks at one way of improving your analytics capabilities and gaining end-to-end visibility into the trends and behaviors of customers, services and systems. 
(WHITE PAPER) READ ABSTRACT |

Text Analytics in the BI Ecosystem by Sybase, an SAP company

October 2010 - (Free Research)
An estimated 80% of enterprise-relevant information resides in text and unstructured forms. Text analytics transforms text into data for BI, data mining, and predictive analytics. This paper reviews business benefits and technical challenges related to taming text. It also introduces text technologies and surveys noteworthy business applications. 
(WHITE PAPER) READ ABSTRACT |

Cisco Connected World Technology Report by Cisco Systems, Inc.

February 2012 - (Free Research)
Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers. 
(VIDEOCAST) READ ABSTRACT |

Personalized Marketing and Web Analytics by IBM

February 2013 - (Free Research)
In this white paper, uncover the gold mine that lies within behavioral data, identify the specific nuggets to mine, and learn how to leverage behavior data to increase marketing returns at every stage of the customer life cycle, both online and offline. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts