سجل المستندات التعريفية

أحدث الموضوعات:

CISOs Investigate: User Behavior Analytics

CISOs Investigate: User Behavior Analytics (UBA) includes interviews with 11 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and time-consuming ...

عرض المستندات التعريفية

Managing User Risk: A Review of LogRhythm CloudAI for User and Entity Behavior Analytics

In this review, we explored the recently released LogRhythm CloudAI, which provides user-focused behavioral analysis built into LogRhythm. CloudAI encompasses a robust NextGen SIEM solution to extend recognition of user threats...

عرض المستندات التعريفية

Market Guide for User and Entity Behavior Analytics

Security and risk management leaders considering UEBA will find that the market has fragmented, with a few pure-play vendors and a wide set of traditional security products that embed core UEBA technologies and features to bene...

عرض المستندات التعريفية

Networking and Information Systems (NIS) Directive

The EU’s Network and Information Systems (NIS) Directive entered into force in August 2016 with the aim of increasing the resilience of cybersecurity defences across Europe. The clock is now ticking with EU member states having...

عرض المستندات التعريفية

Risk Of Inaction vs Return On Investment

Poor marketing strategies, convoluted analysis and campaign insights, and fragmented reporting have for, a long time now, been an easy scapegoat for low growth and sales across many organisations in different industries. The ma...

عرض المستندات التعريفية

100 Days To Success: A Treasurer's Guide To Career Advancement

The first 100 days in a new job are known to be crucial in setting the right course. The challenge facing treasurers is to acquire a quick overview, identify company-critical risks, introduce necessary measures at short notice ...

عرض المستندات التعريفية

Security and Risk Management in Payment Transactions

Alongside smaller companies, there are still many medium and largesized companies that have not yet implemented real-time monitoring of their payment processes. The result? These organizations then fail to discover missing cash...

عرض المستندات التعريفية

Move™ - IoT Connect

The digital economy is changing our lives and the way we do business. Connectivity needs to be pervasive and reliable for IoT devices to connect on the best networks available. Working behind the scene, ensuring IoT interconnec...

مشاهدة ندوة على حسب الطلب عبر الإنترنت

Gaining Customer Value from the Internet of Things

Tata Communications Delivers More than Just Global Connectivity Beyond smartphones, our “everything connected world” is fostering a rising business opportunity for organizations globally. Industry-specific and cross-industry I...

عرض المستندات التعريفية

Leveraging The Power Of Edge Computing To Drive Your Business Forward

Certainly, the proven advantages of traditional cloud computing mean it will continue to play an important role in the technology ecosystem. But for some applications, moving processing power from a central location to the edge...

عرض المستندات التعريفية
سجل في نشرتنا الإخبارية
تلقى أهم الأخبار عبر البريد الإلكتروني مجانًا