Search

Page 35 of 472 results

Leadership Compass

Identity API Platforms

by Richard Hill

... in industry compliance use cases and security incident analysis as examples. Workflow ... capabilities to aid in compliance and security incident analysis as examples. Workflow & ... offers a robust API security capability which includes real-time AI-based protection. Ping ... fraud and cyber threat intelligence solutions. Workflow APIs are ... APIs. Third party SIEM or Security Intelligence Platforms are also supported out ... 71129 Leadership Compass: Access Governance & Intelligence - 71145 Leadership Compass: Access ...

Executive View

Informatica CLAIRE Engine

by Anne Bailey

... is a natural match between business intelligence and artificial intelligence (AI). AI is adept at ingesting ... on AI in order to make business intelligence an efficient and optimized activity. Intelligent ... Built on an enterprise unified metadata intelligence foundation, the CLAIRE engine addresses ... an AI-engine because processing time and costs are reduced. ... Certified, IPAA, SOC3, Cloud Security Alliance, AICPA SOC2). Data ... It handles data at any latency, be it real-time, streaming, or in batches. The fact that ...

Executive View

Bromium Secure Platform 4.1

by Matthias Reinwarth

... valuable forensic information on breaches, allowing security and threat analytics teams to be ... SOCs (Security Operations Centers) and the access to Bromium threat intelligence services. ... is an innovative approach for achieving endpoint security. It avoids traditional signature or blacklisting ... locked-down environment, while gathering intelligence in real-time. Although the Bromium approach contains ... Access Governance and Intelligence - 71145 Leadership Compass: Enterprise Endpoint Security: Anti-Malware ...

Leadership Brief

Beyond Marketing: The Future of Customer Interaction

by Roland Bühler

... , ethics, privacy, and security. Technological aspects, such as artificial intelligence, the Internet of Things ... , data science, ethics, privacy, and security. Team diversity in terms of gender or cultural ... for marketing purposes. When it comes to security topics, smart and secure authentication ... customer interaction from a convenience and security perspective. Real-Time Experience A further highly relevant ... -centric interaction concepts. Be Fast Consider real-time services whenever possible, as customers more ...

Buyer's Compass

Endpoint Protection

by John Tolbert

... analysis. Enterprise security administrators need dashboards to get real-time threat and infection ... reports. Security Intelligence integration Endpoint protection solutions must integrate with security intelligence systems. ... able to send relevant logs information to security intelligence platforms such as SIEMs or SOARs ... feature-rich connectors to specific security intelligence systems. Forensic investigation tool ... need to share event information with security intelligence solutions. Cloud vs. on-premises ...

Executive View

IBM Watson

by Anne Bailey

Introduction Artificial intelligence (AI) is a buzzword with many strong business ... input data on a model, and generate real-time predictions. Watson Machine Learning also ... AI project or machine learning models for real-time insights, IBM Watson provides tools ... View: IBM Cloud Pak for Security – 80172 Executive View: IBM MaaS360 ...

Blog

The Story of Edge AI

by Alexei Balaganski

... believer in the bright future of Artificial Intelligence or somewhat of a skeptic like me – you simply ... machine learning services efficiently. For real-time scenarios like self-driving cars ... cannot afford the risks for a security breach or a compliance violation fine. These ...

Leadership Compass

Access Management and Federation

by Martin Kuppinger

... for multiple authenticators, ability to perform real-time risk analysis of behavioral and environmental ... as the degree in which it integrates with security intelligence and forensic systems. Registration: Registration ... risk factors, such as device fingerprint, time of day/week, IP address, geo-location ... . In that time, ISAM has continued to evolve to meet the growing list of IT security requirements ... are supported, including biometrics. At this time, some MFA functionalities require additional ...

Leadership Brief

Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits?

by Anne Bailey

... The conversation surrounding artificial Intelligence and machine learning is still ... to historical data, a constant flow of real-time data, a repetitive task to be completed, ... to historical data, a constant flow of real-time data, a repetitive task to be completed, ... such as installation date, load, running time, and standard maintenance timelines – an AI ... machine downtime, enabling a just-in-time delivery of replacement parts, and ... ”, and deliver value by increasing security for account holders against fraud ...

Blog

Account Takeovers on the Rise

by John Tolbert

... large sums to fraudsters during real estate closing deals. Consumer-facing ... designed mobile apps. Use mobile security SDKs to build apps. Push ... mechanisms for not only better security, but also enhanced privacy, ... products). Use fraud reduction intelligence services for real-time analysis of many pertinent behavioral ... geo-velocity, bot intelligence, and cyber threat intelligence. These solutions employ ... be publishing additional research on Fraud Reduction Intelligence Technologies in the near future. Stay ...