by Shlom | Jun 12, 2017 | Uncategorized
There are a number of guidelines to follow when it comes to protecting your data. Questions on how best to achieve this often include examples like “which data should be classified as sensitive?” and “which groups of users should have access to this data?” In fact,...
by Shlom | Jun 12, 2017 | Advanced Analytics
Over the next couple of years, security professionals can expect abundant innovation and plenty of competition in their field. The big data security analytics market is breaching high water marks with enterprise players, government integrators, security vendors, and...
by Shlom | Jun 12, 2017 | Uncategorized
As networks continue to grow in size, so invariably does the number of endpoints grow – all of this makes endpoint threat detection more difficult than ever. At the same time, so too does detecting them become ever more important. As such, a very reasonable question –...
by Shlom | Jun 12, 2017 | Advanced Analytics, Big data
The use of big data and advanced analytics are slowly moving from theory into practice in the business world. However, the use of these potential game-changers is noticeably different across varying industries – even when there is an obvious application. While in...
by Shlom | Jun 12, 2017 | Uncategorized
Almost every day there is news of yet another security breach. Yet still too many organizations assume they are immune from attack because they practice their own ‘good hygiene’ when it comes to internal security. Time and time again, however, companies...