Display search results for ** instead (50 products)

Showing 31-40 of 50

The day of reckoning is fast approaching. On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. The European Union (EU) regulation, known as (EU) 2016/679, provides data protection and privacy for all individuals in the EU. GDPR is a law covering all EU member countries, which includes enforcement with fines and/or san...

USD 3,000.00

USD 2,250.00 save 25 %

This report looks at the reasons why IDaaS is a growing alternative to on-premises, licensed software for many enterprises; how one leading company in the IDaaS market—Santa Clara, California-based Centrify—is delivering on the potential of this new security option; and why enterprises are making the choice to secure access to their corporate s...

USD 3,000.00

USD 2,250.00 save 25 %

Dynamic defenses interact directly with attackers. By dynamically intensifying attacker interactions, dynamic defenses confirm the attacker’s purpose, clarify the threat level of each attacker session, and pragmatically contain the attacker’s activities. Operating in real-time and individually with each attacker session, the interaction and con...

USD 3,000.00

USD 2,250.00 save 25 %

Everyone wants analytic insights to make smarter, faster decisions. But before we reap the benefits of analytics, we must first sow good data. Separating the wheat from the chaff requires effective data preparation: ETL and data mashups, data wrangling, data blending—however you say it or brand it. We assert that, partly as a result of the moun...

USD 3,000.00

USD 2,250.00 save 25 %

Cloud centers (like all data centers) are subject to infrastructure failures. In 2017, most major cloud service providers suffered hours-long outages in some of their services and regions—including AWS, Azure, IBM, Google, Microsoft, and Apple. Enterprises that “click to buy” on-demand cloud services without closely examining the terms and co...

USD 3,000.00

USD 2,250.00 save 25 %

The delivery process for IoT-based solutions is much more than connecting purpose-built devices to the internet. Yet, businesses and consumers focus on the outcomes from device-to-device interconnection, assuming that the appropriate levers of process automation combine adequately and affordably with the right type of connectivity. This report sum...

USD 3,000.00

USD 2,250.00 save 25 %

In this insight, Stratecast catalogs the trending maturation of deception as a valuable cybersecurity technology, and its growing market demand. From there, we turn our attention to what Stratecast believes will be the next chapter in deception: incorporation into managed security service providers’ (MSSPs) service offerings.

USD 3,000.00

USD 2,250.00 save 25 %

This report discusses the primary benefits of NoSQL; barriers to adoption of NoSQL; the ready availability of NoSQL solutions, as exemplified by some of the top providers thereof; and competitive dynamics at work in the space. The report then makes specific recommendations for enterprises and vendors deploying NoSQL.

USD 3,500.00

USD 2,625.00 save 25 %

This report is the second in a two-part series on NoSQL databases to provide a fuller view of the wide range of options available to those who (wisely) wish to deploy these technologies. The companion report in this two-report series deals with the issues surrounding NoSQL DBs versus existing relational DBs; competitive issues among NoSQL provider...

USD 3,000.00

USD 2,250.00 save 25 %

Taking a practical approach to AI simplifies the decision to implement AI capabilities; but it also ensures that AI-enabled tools will deliver value upon implementation, rather than requiring a protracted period of training and customization. Sales engagement, in particular, will generate immediate returns on investment as tuned AI functionality co...

USD 3,000.00

USD 2,250.00 save 25 %

Showing 31-40 of 50