Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Big Data

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







An Essential Guide to End-to-End Encryption

by WickrNov 17, 2021

Data encryption is necessary to help protect your enterprise's valuable data. It's also important when you need to keep your company's communications secure. For this reason, you need to consider updating your company's communications solutions to ensure the strongest possible security — which typically includes encrypted messaging. Many apps boast of their encryption technology, but is all E2E security the same? Download the guide to learn more.


How End-to-End Automation Enables Business Transformation

by UiPathSep 17, 2021

To go beyond robotic process automation (RPA) means using more smart tools and technologies. A successful automation starts with process analytics and planning and continues over the entire business transformation. This holistic approach to automation turns a one-off improvement project into a program, that's aligned with strategic business goals.

Creating an end-to-end automation program lets your enterprise gain resilience, timely adapt to changing market needs, and constantly


RPA: Key Drivers for Time to Value

by UiPathSep 17, 2021

Robotic Process Automation (RPA) offers a range of demonstrable business benefits. Yet, the technology is new enough that adopters may be concerned about the time it takes to realize value and Return on Investment (ROI) from an RPA project. This paper highlights the drivers of time-to-value for RPA. Based on real user reviews of UiPath on IT Central Station, it discusses the importance of having a Total Cost of Ownership (TCO), end-to-end automation, cost savings, time savings, reductions in


Dirty Little Secrets of Business Intelligence: Six Challenges to Adoption

by enVistaJul 14, 2021

In a world where data is the new currency, the company with the best business intelligence (BI) wins. Businesses that are best able to collaborate using keen insights from data make better decisions with greater resiliency and agility. That's a big reason why 83 percent of enterprise executives are pursuing big data projects, according to Forbes. Unfortunately, many organizations face unforeseen challenges that prevent BI success.

Download this white to learn:
• Six most


The State of DLP Report

by TessianJun 24, 2021

Data loss — whether accidental or intentional — is a big problem for organizations. Why? Because people control our data, and people break the rules and make mistakes. We're only human.

The question is: Do security, compliance, and IT leaders have true visibility over how their employees are handling and mishandling data on email?

According to our research, not yet. But, after reading this report, they should have enough information to inform their view.


4 Practical Tips for Building a Data Lake With VMware Tanzu Greenplum

by Dell Technologies and IntelJun 18, 2021

Most very large enterprises have already built data lakes, and they are seeing a number of benefits as a result of becoming more data-driven. As a direct result of integrating more data and analytics into their decision-making processes, organizations are becoming more optimized, more profitable, and more competitive within their markets. By contrast, some small and medium-sized enterprises haven't yet fully adopted data lakes. As a result, they aren't realizing the data lake advantages that


Why Your Digital Transformation Project is More Complex Than You Think

by InRule TechnologyJun 17, 2021

Most organizations know they need to undergo a digital transformation, but few understand what that really entails. Additionally, research shows that colleagues often have different definitions of digital transformation, team needs, and how to execute the transformation.

Download the paper to explore:
• Common (and often overlooked) complexities that organizations face when embarking on a digital transformation journey
• Key decisions that need to be made for a


Why You're Wrong About Operationalizing AI

by InRule TechnologyJun 03, 2021

Myths about how to operationalize AI prevent many organizations from ever getting these projects off the ground. New research from Forrester (commissioned by InRule) explores common AI myths and presents recommendations for how to overcome these myths to realize AI project success.

Download the study to discover:
• The top five challenges of using AI technologies
• The most commonly identified use cases for AI projects
• Forrester's five


Bandura Threat Intel Integrations Infographic

by Bandura CyberMay 17, 2021

Bandura makes life easier by filtering through the noise and delivering threat intelligence from multiple trusted and best-in-class sources so that you don't have to. We provide out-of-the-box threat intelligence data and can also integrate intelligence in real time from any source, including from your currently deployed security tools.

Download this infographic now and learn about our integrations spanning:
• Commercial
• Open Source
• Government


The State of CCPA 2021

by DataGrailMar 11, 2021

2020 was the year that the California Consumer Privacy Act (CCPA) went into effect, giving Californian consumers the right to take more control of their data.

Here at DataGrail, we analyzed millions of DSRs processed throughout 2020 across our business-to-consumer (B2C) customers to create this report, which gives us unique insights into the number of requests a company can anticipate.

Read the report to learn:
• How many DSRs you can expect to receive


SUBTOPICS:

Bandura Cyber

Bandura uses the best-in-class threat intelligence to secure your networks, data, and users, in real time — wherever they are — on-prem, cloud, remote, or all of the above. The platform blocks attacks from up to 150M malicious IPs and domains in real time with no latency. We provide out-of-the-box threat intelligence and integrate data from any source. At Bandura, we believe nothing scales like simplicity. We make blocking threats smart and simple — at scale — everywhere.


DataGrail

DataGrail is a data privacy platform for modern brands like Databricks, Restoration Hardware, and Twilio to build customer trust and deliver on their commitment to transparency. DataGrail gives businesses one easy-to-use platform to simplify, automate, and scale their privacy programs, and stay compliant with regulations like GDPR, CCPA, LGPD, and forthcoming regulations.


Dell Technologies and Intel

Dell Technologies plays a key role in providing the essential infrastructure for organizations to build their digital future, transform IT, and protect their most important asset -- information. Dell Technologies enables IT and digital business transformation through trusted big data solutions, built on a modern data center infrastructure that incorporates industry-leading technologies.

Intel® Xeon® processor families, SSDs, and FPGAs deliver the performance for real-time, high-capacity data analysis that can help businesses derive rapid insights to build innovative services and customer experiences. With high performance, large memory capacity, robust reliability, virtualization, and security features, Intel technologies have been designed for the most mission-critical workloads and the always-on enterprise.


enVista

enVista is a global software, consulting, and managed services provider, optimizing and transforming physical and digital commerce for the world's leading manufacturers, distributors, 3PLs/LSPs, and omnichannel retailers.

enVista uniquely optimizes and transforms physical and digital commerce — optimizing supply chain efficiencies to drive cost savings, and unifying commerce to drive customer engagement and revenue. These comprehensive capabilities, combined with enVista's market-leading Unified Commerce Platform, Enspire Commerce and the firm's ability to consult, implement and operate across supply chain, transportation, IT, enterprise business solutions and omnichannel commerce, allows mid-market and Fortune 100/5000 companies to leverage enVista as a trusted advisor across their enterprises.

Consulting and solutions delivery are in our DNA. Let's have a conversation.™


InRule Technology

InRule Technology® enables enterprises to understand and automate decisions with unparalleled speed, agility, accuracy and transparency. IT and business personnel rely on InRule's Decision Platform to increase productivity, grow revenue and enhance customer service. With its 'author first' approach, InRule empowers both technical and business rule authors to write and manage rules. From on-premises, to the cloud and via mobile, InRule allows organizations to run rules anywhere for extreme flexibility and scalability. More than 400 InRule User Community members depend on InRule to reduce development and change cycles by 90 percent for their mission critical systems and customer-facing applications. InRule has been delivering measurable business and IT results in high-performance environments since 2002.


Tessian

Tessian's mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error — like data exfiltration, accidental data loss, business email compromise and phishing attacks — with minimal disruption to employees' workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel, March Capital, and Balderton and has offices in San Francisco and London.


UiPath

UiPath has a vision to deliver the Fully Automated Enterprise™ , one where companies use automation to unlock their greatest potential. UiPath offers an end-to-end platform for automation, combining the leading Robotic Process Automation (RPA) solution with a full suite of capabilities that enable every organization to rapidly scale digital business operations.


Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide. In the workplace and out in the field, Wickr enables end users to communicate securely and protect their privacy while providing IT organizations the administrative controls needed to deploy at scale and provides flexible options and controls for information governance and compliance for regulated industries.