Remove Big data Remove Blog Remove Financial Services Remove Mining
article thumbnail

Financial Services Data – More at risk than you’d believe

Thales Cloud Protection & Licensing

One of the top findings from the 2018 Thales Data Threat Report, Financial Services Edition was that data breaches in U.S. financial services organizations are increasing at an alarming rate. Each and every environment and instance requires a data security plan and implementation tuned to the environment.

article thumbnail

Process Excellence: A transformational lever to extreme automation

IBM Big Data Hub

All are transforming their procurement operations by leveraging state-of-the-art process mining and intelligent automation technology. A Process Mining exercise drawing data from enterprise SAP has helped measure KPI performance and define the transformation roadmap. dollars annually in direct or indirect procurement.

Mining 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. To make a long story short – the top reason that they didn’t invest in data security was “lack of perceived need” at 52%.

Retail 66
article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

The conversation is simple because the objective is simple: How do I become more effective at leveraging (big) data and analytics (artificial intelligence) to power my business? Bounty of potential data sources to be mined for actionable insights in support of the business initiative. It’s simple.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

The 57 percent rate statistic is the highest of all verticals we measured in this year’s report (others include the healthcare industry, the retail industry, and the financial services industry) or any region surveyed. A basic security maxim is that those who control the keys control access to the data.

article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

The conversation is simple because the objective is simple: How do I become more effective at leveraging (big) data and analytics (artificial intelligence) to power my business? Bounty of potential data sources to be mined for actionable insights in support of the business initiative. It’s simple.