Results for REA

Bigstep Launches Easy-to-Use ‘Data Lake as a Service’ Optimized for Big Data

Big data as a service provider Bigstep just launched a ‘data lake as a service’ offering, the Full Metal Data Lake.  It looks to remove much of the cost, hassle and complexity of big data and data management at such explosive scale.

Full Story >

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

MapR Ushers in New Year for Big Data; Breaks Down Data Silos with Converged Data Platform

In January, MapR will ship its new Converged Data Platform, designed to break down silos by integrating file, database, stream processing, and analytics on one platform. IDN talks with MapR about the new platform – and tips for IoT-ready big data.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

Push Technology ‘Pushes the Limits’ for Extreme Data Delivery to Web, Mobile Apps

Push Technology continues to push the limits of speed and scale for data delivery with web, mobile and even IoT apps. Push’s Diffusion data distribution platform adds a new cloud-based version, along with updated features to make it easier for developers to build apps ready to stream real-time data to millions of devices.  IDN speaks with Push CTO Dr. Andy Piper.

Full Story >

BP Logix Process Director 4.0 Adds Real-Time, Ad Hoc Features To Better Meet Business Goals

This fall, BP Logix is shipping an update to its code-free platform to help companies better meet business goals. Process Director 4.0 adds easier ways to share data, design forms, set and adjust to goals even in ad-hoc and real-time situations. IDN speaks with BP Logix vice president Scott Menter.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

LogRhythm Extends Threat Analytics Suite with Endpoint Module

Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics modules for network and end user visibility.

Full Story >

MapR 5.0 Brings Real-Time to Hadoop Big Data Apps, Searches and More

MapR Technologies’ latest update to its Hadoop distro delivers a new level of real-time capabilities to big data apps. Notably, MapR 5.0 supports access to transactional data by auto-synchronizing storage, database and search indices. IDN speaks with MapR’s Jack Norris.

Full Story >

Bonita BPM 7 Set To Deliver ‘Easy-To-Configure’ BPM for Continuous Change, Real-Time Business

This week, Bonitasoft is set to bring BPM to the world of real-time business. Users will be able to make live changes to forms, workflows, business data and UIs with Bonita BPM 7, the company’s latest update set for release. IDN speaks with Bonitasoft CEO Miguel Valdés-Faura.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Showing 13 - 24 of 90

Videos

Turning Automated Decision Management into Real-time Operational Advantage



  • Brian Safron - Program Director, WebSphere Business Rules and Events

Using SOA to Power New Mobile, Cloud & Process Applications



  • Subhash Ramachandran -
    Sr VP, Product Management 

Turn IT Disruptors into Real Business Value with BPM



Malcolm Ross - VP, Product Marketing

Beyond Process Modeling: Creating Modern Process Driven Applications with BPM



Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

IBM MobileFirst Platform - Build, Integrate and Scale Great Mobile Apps



  • Curtis Gearhart - Sr Product Mgr
  • Anil Daswani - Product Mgr

BPM IN CONTEXT - Solving real problems with BPM



  • Phil Simpson - Sr. Product Marketing Manager

Integrating Mobile, Cloud, & IoT Apps with an Open Source RESTful Backend



  • Bill Appleton - CEO & Co-Founder

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Let's Get Real (Time)



  • Jack Norris - SVP Data and Applications

When Bots Attack! Stopping OWASP's New Top 20 Automated Threats



  • Rami Essaid - CEO & Co-founder