Display search results for ** instead (150 products)

Showing 31-40 of 150

As of mid-2018, attackers showed that they have no intentions of slowing their relentless development of new attack techniques, as evidenced by a re-discovered tactic of abusing open source protocols to create diffraction attacks that bypass static detection rules. This is a known but rare tactic that challenges traditional detection methods, and d...

USD 3,000.00

USD 2,250.00 save 25 %

A fascinating aspect of the cloud era is the expanding options for organizations to move from being owners to renters of IT capabilities. From a security perspective, decreasing ownership also transfers blocks of responsibility from cloud customers to the cloud services provider. This, in essence, is the shifting attribute of the cloud shared respo...

USD 3,000.00

USD 2,250.00 save 25 %

Spreadsheets are ubiquitous and largely a default tool for data analysis; yet, they are also a trap and one which will increasingly limit the ability of companies to compete effectively. Yes, they provide a useful way to visualize data, but their limitations, especially in an age of big data, can seriously compromise a company’s ability to extrac...

USD 3,000.00

USD 2,250.00 save 25 %

The cloud infrastructure market is highly consolidated, with the top three providers holding nearly 85% of the US market. The market leaders have earned their dominance, with scale, product quality, and continual innovation. They have also hampered competition in the market. And yet, the market continues to support IaaS providers beyond the big 3....

USD 3,000.00

USD 2,250.00 save 25 %

The automated, programmatic generation of telephone calls, “robocalls,” is an increasing threat that targets both fixed-line and mobile network customers. Robocall misuse is escalating despite control measures enacted by regulatory edicts, apps for mobile devices designed to filter such calls, and consumer complaints. In 2017, robocall complain...

USD 3,000.00

USD 2,250.00 save 25 %

As the pace of business accelerates, a critical question for businesses is how they can afford to spend time training new employees on company systems and processes. Existing employees also present a problem as new technology is rolled out. When a return on investment (ROI) depends on people using the technology successfully and quickly, the differ...

USD 3,000.00

USD 2,250.00 save 25 %

Remote browser isolation is one of those emerging cybersecurity technologies where users actually say, “I really wish I had this before as it rewrites how my organization approaches and manages cyber risk.” In this insight we re-cap the product and market progress of four suppliers of remote browser isolation products: Authentic8, Light Point ...

USD 3,000.00

USD 2,250.00 save 25 %

The data management industry has made rapid advancements in storing massive amounts of data—but if it does not also give users the ability to perform data preparation at scale, the analytic insights their organizations are thirsting for will fail to materialize. What organizations need is to equip their business users with self-service data prep...

USD 3,000.00

USD 2,250.00 save 25 %

This insight provides an overview of GDPR, as companies that need to comply should by now be well aware of its implications. In addition, the report focuses on why it is best for companies to view this regulation less as a restriction on data usage, or a curtailing of legitimate customer relationship management (CRM) practices, as some companies do...

USD 3,000.00

USD 2,250.00 save 25 %

The business approach of San Francisco-based Identity and Access Management solutions supplier, Okta, can be characterized in a single word: straightforward. Okta’s goal is to enable any organization to connect to any technology it needs in order to be successful. This report looks deeper into the Okta platform and the role it plays in helping ...

USD 3,000.00

USD 2,250.00 save 25 %

Showing 31-40 of 150