Display search results for ** instead (55 products)

Showing 1-10 of 55

Cybersecurity technologies strategically reside in three primary locations: --In devices – endpoints --Surrounding networks of endpoints and systems – perimeters --Between devices and users, and their destinations – gateways (or proxies) How the collection of locations improves cybersecurity efficacy (i.e., “better together”) is ultima...

USD 3,000.00

USD 2,250.00 save 25 %

The new lifestyle as a service (LSaaS) encompasses not only the things people use, but people themselves. As services such as health monitoring and augmented reality become the norm, the individual increasingly becomes a nodal point in an expanding service network: a consumption point rather than a production point. In fact, in a very real sense, t...

USD 3,000.00

USD 2,250.00 save 25 %

The lack of consensus with regard to real-time analytics technologies is creating a barrier to entry for those who wish to deploy it. This report is designed to be meaningful and useful for anyone engaged in exploring, selecting, specifying, deploying, and managing solutions to provide organizations with real-time analytic insights. The report di...

USD 3,500.00

USD 2,625.00 save 25 %

Enterprises and their Identity & Access Management (IAM) solutions providers, have begun to make system access and identity management a top priority. They have put online interactions on a path to a more secure future, which begins with an expanded and more balanced approach to IAM. This approach recognizes both the challenges and opportunities pr...

USD 3,000.00

USD 2,250.00 save 25 %

In the Big Data and Analytics (BDA) market, even the largest players in the space, some of which in recent years have spent billions of dollars acquiring smaller BDA players in order to fill out their portfolios, have yet to introduce a unified platform to meet the data management needs of a broad swath of the market. As a result, paralysis by over...

USD 3,000.00

USD 2,250.00 save 25 %

Phishing, hacking, account takeover, and many other threats await security professionals every moment of every day. Privileged Access Management (PAM) assists in mitigating these threats. Used in conjunction with other management and assessment tools, PAM presents an even stronger defense and a more multi-level approach to overall security. PAM is...

USD 3,500.00

USD 2,625.00 save 25 %

Artificial intelligence (AI)—especially machine learning technologies as applied to advanced analytics—provides a way to transcend the limitations of human analysis, and evolve from a data-centric IT to an information-centric IT. AI provides the capabilities to deliver a true intelligence technology: one that, once trained, requires no human in...

USD 3,500.00

USD 2,625.00 save 25 %

Whether consumers decided they wanted more personalized services, or online retailers and content companies convinced them that they did, the digital economy is now at a place where personalization is the assumed goal. To get there, enterprises need to know much more about their customers. In turn, customers and potential customers (end users) must...

USD 3,500.00

USD 2,625.00 save 25 %

This SPIE assesses the recent trends in private cloud, including customer buying habits and the expected growth of private cloud over the next two years. The report also reviews Joyent’s latest offering, Triton Private Region and evaluates it on its market advantages and customer benefits.

USD 3,000.00

USD 2,250.00 save 25 %

When Stratecast began its Augmented Reality (AR) coverage, the general consensus was that AR would be mostly relegated to the gaming community, with few practical real world applications. Stratecast has been consistently bullish on the utility of and the eventual dominance of AR in both the consumer community as well as in business. This year’s r...

USD 3,500.00

USD 2,625.00 save 25 %

Showing 1-10 of 55