UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Targeting Events That Matter: The Next Generation of SIEM

by SecureAuthSep 04, 2015

Today’s IT security organizations are not only fighting cyber attackers – they are fighting a deluge of information from their own systems. Security logs, threat intelligence feeds, cyber forensics tools – all of these emerging systems are creating such a morass of information that many enterprises – including Target – are missing key data that may indicate a major data breach. The result: the bad guys continue to get through and wreak havoc, unfettered. For many

  • Security Management & Analytics
  • Details

Selecting the Right Database Technology for Business Analytics

by SisenseSep 02, 2015

Choosing the most suitable database technology can make or break your business analytics deployment, especially when dealing with big data. Download this free guide to learn about the differences between various technology stacks - including distributed data warehouses, OLAP, and in-memory processing - and to find out which you technology is best suited for different business scenarios.

  • Sisense
  • Software
  • Enterprise
  • Details

BI and Analytics With or Without a Data Warehouse

by SisenseSep 02, 2015

What is an enterprise data warehouse (EDW)? When is it necessary, and what is its role in business intelligence projects? This presentation will introduce you to basic concepts in data warehouse architecture and the available alternatives for deploying a BI system with or without a data warehouse.

  • Sisense
  • Software
  • Enterprise
  • Details

9 Questions to Determine If a BI Solution Is Truly Self-Service

by SisenseSep 02, 2015

Everybody's talking about self-service business intelligence, but is that just marketing-speak? Can a business intelligence software tool allow business users to be completely self-reliant, or will IT always play a part in these projects? Get your copy of this free whitepaper to understand what "self-service" means, in the context of business analytics, and how to determine a specific BI tool's level of self-service.

  • Sisense
  • Software
  • Enterprise
  • Details

5 Dos and Dont's of Embedded Analytics

by SisenseSep 02, 2015

Adding embedded analytics and reporting features to your software, SaaS or cloud apps can greatly improve your value proposition to customers. But before you begin, check out this free beginner's guide to ensure you're on the right track when embarking on an embedded BI project, covering questions such as: build vs buy, how to evaluate embedded BI vendors, building a support model and more!

  • Sisense
  • Software
  • Enterprise
  • Details

Joins, Aggregations and Many-to-Many Relationships - The Data Mash-Up Cheat Sheet

by SisenseSep 02, 2015

Are you an up and coming data analyst or simply love to crunch data? It's time to get educated about mashing up data sources. Learn about the various ways of combining data using 'join' functions, the problem with many-to-many relationships and how to avoid them, and many more practical tips in this easily digestible ebook. Download now and never find yourself in a bad (data) relationship again!

  • Sisense
  • Software
  • Enterprise
  • Details

Winning todays consumer: How market leaders are transforming existing applications to deliver exceptional customer experiences

by CaprizaSep 02, 2015

Industries are being shaped today by the dramatic shift in consumer expectations. New companies are emerging that are delivering fast, mobile, immediate transactions. Find out how established enterprises are retooling existing applications to deliver cutting edge customer experiences and remain competitive in todays market.


Digitizing Financial Services Systems to Win on Customer Experience

by CaprizaSep 02, 2015

The financial services industry is being disrupted by new market entrants offering fast, mobile, immediate transactions. Find out how banks and other financial institutions are retooling their existing applications to deliver on exceptional customer experiences and remain competitive in the market.

  • Business Intelligence
  • Payments
  • Details

Protecting Your Organization from Insider Threats

by Lockheed MartinSep 01, 2015

When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands - whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and enforcing some proactive measures can dramatically reduce the threat of sensitive data walking out the door.

This white paper discusses: Current risk factors - How sensitive data can fall into the wrong hands What you stand to lose from insider

  • Lockheed Martin
  • Risk Management/Security
  • Security Monitoring
  • Details

Hybrid Cloud Survey

by InformationWeekSep 01, 2015

We polled 383 respondents for our Hybrid Cloud Survey to determine the extent of hybrid cloud use in the enterprise.

In this report, we:


>> Look at management complexity, cost volatility, and data protection issues.
>> Examine which workloads to run on public versus private clouds.
>> Discuss compliance, identity, connectivity, and other security questions.