Skip to content
 

big crowds

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Polycom     Published Date: Jul 24, 2014
Brains, not brawn: Fewer companies than ever before are shackled to the tyranny of the volume play: producing vast quantities of goods to reap razor-thin margins. Instead, manufacturing has been freed to search for the next big idea – and many of them. What’s empowering this idea revolution: automated processes, new technologies at the ready, and a thorough understanding of R&D’s costs and contributions? Realizing that there is strength in numbers, companies are creating virtual innovation hubs with valued partners, joining industry consortia, and opening up product development to crowdsourcing. What’s common to all: Companies are drawing closer to epicenters of talent, demand, and supply and moving faster than ever to commercialize great ideas. Are you ready?
Tags : 
polycom, commodity, innovation, manufacturing, automation, r&d
    
Polycom
Published By: GoToWebinar     Published Date: Oct 08, 2013
During a presentation, your confidence influences how receptive your audience is to your message. Sweating yet? In less than a minute, your audience forms impressions of you and your credibility based on what you say and how you say it. This brief by Matt Abrahams, communication and presentation expert, explores how you can shake your stage fright to present with confidence.
Tags : 
strategic communications, leadership, matt abrahams, stage fright, presenting, presentations, anxiety, gain confidence, knowledge credibility, credibility, audiences, big crowds, fright, customer experience/engagement, trade shows/events, sales
    
GoToWebinar
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.