UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

BI and Analytics With or Without a Data Warehouse

by SisenseSep 02, 2015

What is an enterprise data warehouse (EDW)? When is it necessary, and what is its role in business intelligence projects? This presentation will introduce you to basic concepts in data warehouse architecture and the available alternatives for deploying a BI system with or without a data warehouse.

  • Sisense
  • Software
  • Enterprise
  • Details

Joins, Aggregations and Many-to-Many Relationships - The Data Mash-Up Cheat Sheet

by SisenseSep 02, 2015

Are you an up and coming data analyst or simply love to crunch data? It's time to get educated about mashing up data sources. Learn about the various ways of combining data using 'join' functions, the problem with many-to-many relationships and how to avoid them, and many more practical tips in this easily digestible ebook. Download now and never find yourself in a bad (data) relationship again!

  • Sisense
  • Software
  • Enterprise
  • Details

5 Dos and Dont's of Embedded Analytics

by SisenseSep 02, 2015

Adding embedded analytics and reporting features to your software, SaaS or cloud apps can greatly improve your value proposition to customers. But before you begin, check out this free beginner's guide to ensure you're on the right track when embarking on an embedded BI project, covering questions such as: build vs buy, how to evaluate embedded BI vendors, building a support model and more!

  • Sisense
  • Software
  • Enterprise
  • Details

Winning todays consumer: How market leaders are transforming existing applications to deliver exceptional customer experiences

by CaprizaSep 02, 2015

Industries are being shaped today by the dramatic shift in consumer expectations. New companies are emerging that are delivering fast, mobile, immediate transactions. Find out how established enterprises are retooling existing applications to deliver cutting edge customer experiences and remain competitive in todays market.


Selecting the Right Database Technology for Business Analytics

by SisenseSep 02, 2015

Choosing the most suitable database technology can make or break your business analytics deployment, especially when dealing with big data. Download this free guide to learn about the differences between various technology stacks - including distributed data warehouses, OLAP, and in-memory processing - and to find out which you technology is best suited for different business scenarios.

  • Sisense
  • Software
  • Enterprise
  • Details

9 Questions to Determine If a BI Solution Is Truly Self-Service

by SisenseSep 02, 2015

Everybody's talking about self-service business intelligence, but is that just marketing-speak? Can a business intelligence software tool allow business users to be completely self-reliant, or will IT always play a part in these projects? Get your copy of this free whitepaper to understand what "self-service" means, in the context of business analytics, and how to determine a specific BI tool's level of self-service.

  • Sisense
  • Software
  • Enterprise
  • Details

The Cybercrime Economics of Malicious Macros

by ProofpointSep 01, 2015

Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats — and sometimes take their eye off old ones — and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case and technical analysis.

Our new report, "The Cybercrime Economics of Malicious Macros," examines the technical and business characteristics of malicious macros to

  • Proofpoint
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Protecting Your Organization from Insider Threats

by Lockheed MartinSep 01, 2015

When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands - whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and enforcing some proactive measures can dramatically reduce the threat of sensitive data walking out the door.

This white paper discusses: Current risk factors - How sensitive data can fall into the wrong hands What you stand to lose from insider

  • Lockheed Martin
  • Risk Management/Security
  • Security Monitoring
  • Details

Gartner Magic Quadrant for Secure Email Gateways, 2015

by ProofpointSep 01, 2015

As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways, Proofpoint uniquely combines a world class email gateway solution with the industry's leading Targeted Attack Protection technology, catching and stopping cyberthreats from malicious links and attachments hours or even days before traditional defenses.

  • Proofpoint
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

The Human Factor 2015

by ProofpointSep 01, 2015

Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.

This paper uses original field research to provide insight on who is clicking, and what they are clicking

  • Security
  • Storage
  • Vulnerabilities
  • Threats
  • Proofpoint
  • Details