Sqrrl

Results: 42



#Item
1Computer network security / Sqrrl / Computer security / Crime prevention / Cryptography / National security / Threat / Authentication / Hunting / Carbon Black

Threat Hunting from Network to Endpoint July 2016 | Target. Hunt. Disrupt. Presenters Jim Raine

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-07-21 11:15:01
2BANK / John Russell / Tate

99 BOWERY 2ND FLOOR, NEW YORK, NYUSA BRIDGETDONAHUE.NYC PRESS RELEASE John Russell SQRRL

Add to Reading List

Source URL: bridgetdonahue-media-w2.s3-us-west-2.amazonaws.com

Language: English - Date: 2015-11-01 18:22:57
3Marketing / Business / Customer experience management / Economy / Help desk / Outsourcing / Information technology management / Failure / Sqrrl / Customer support / Technical support / Customer relationship management

DATASHEET SQRRLSUPPORT OFFERINGS Sqrrl’s Commitment

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:54:59
4Data management / Sqrrl / Business intelligence / Distributed computing architecture / Big data / NoSQL / Security information and event management / Analytics / Apache Accumulo / User behavior analytics

    DATASHEET SQRRL ENTERPRISE BIG DATA SECURITY ANALYTICS USE CASE

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:54:16
5Data management / Sqrrl / Apache Accumulo / NoSQL / Database / Big data / Data visualization / Data analysis / Data model / Graph database / Data lineage

DATASHEET SQRRL ENTERPRISE THE LINKED DATA ADVANTAGE  

Add to Reading List

Source URL: sqrrl.com

Language: English
6Computing / Sqrrl / Data / Data management / Computer security / Data-centric security / Bigtable / Big data

Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:52:42
7

Scalable Graph Clustering with Pregel Bryan Perozzi1 , Christopher McCubbin2 , Spencer Beecher3 , and J.T. Halbert3 Abstract We outline a method for constructing in parallel a collection of local clusters for a massive d

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:54:54
    8Computer security / Computer network security / Sqrrl / Threat / Data security / Apache Accumulo / Analytics / Anomaly detection / User behavior analytics / Cyber threat hunting

    DATASHEET SQRRL ENTERPRISE USE CASE: USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) Find Deeper Meaning by Cutting Through the Noise

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-04-01 17:08:54
    9Security / Sqrrl / Computing / Computer network security / Computer security

    Securely explore your data IT’S HUNTING SEASON! Tips for getting started with proactive detection

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2015-05-05 17:12:56
    10Computing / Data management / Data / Sqrrl / Computer security / Big data / Apache Accumulo / Threat / Analytics / Data analysis

    DATASHEET SQRRL ENTERPRISE TARGET. HUNT. DISRUPT. An Advanced Threat Detection and Response Platform Organizations face a growing number of adversaries threatening their networks. And even if they diligently

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-03-07 12:46:49
    UPDATE