Category Archives: News

ITIL PREDICTIVE ANALYTICS REPORT

 

This ITIL report evaluates technologies and applications in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

The Predictive Analytics Scores below – ordered on Forecasted Future Needs and Demand from High to Low – shows you ITIL’s Predictive Analysis. The link takes you to a corresponding product in The Art of Service’s store to get started.

The Art of Service’s predictive model results enable businesses to discover and apply the most profitable technologies and applications, attracting the most profitable customers, and therefore helping maximize value from their investments. The Predictive Analytics algorithm evaluates and scores technologies and applications.

The platform monitors over six thousand technologies and applications for months, looking for interest swings in a topic, concept, technology or application, not just a count of mentions. It then makes forecasts about the velocity of the interest over time, with peaks representing it breaking into the mainstream. Data sources include trend data, employment data, employee skills data, and signals like advertising spent, advertisers, search-counts, youtube activity, patents, and books published.

 

Predictive Analytics Scores:

017721 – Compliance Manager
015754 – Information Security Manager
002461 – Operations Manager
001418 – Change Schedule
001298 – Service Requirements
001051 – Incident Report
000838 – Service Model
000761 – Service Operation
000659 – Agile software development
000580 – Problem Report
000558 – Problem Identification
000506 – Service Assessment
000472 – Service Request
000429 – Security Incident
000376 – Access and Identity Management
000372 – Change Proposal
000368 – Customer Complaint
000363 – Support Request
000357 – Service Desk
000355 – Release Planning
000351 – Incident Resolution
000348 – Service Support
000340 – Request for Service
000340 – Compliance Review
000306 – Availability Test
000298 – Call center
000276 – Request Fulfillment
000263 – Change Record
000256 – Process Area
000254 – Configuration Item
000250 – Service Definition
000248 – Fishbone diagram
000243 – Best practice
000235 – Access Management
000229 – Release Build
000228 – 5 Whys
000226 – Service Review
000209 – Security Review
000207 – ITSM
000199 – Release Deployment
000196 – Customer Portfolio
000190 – Change request
000189 – Service Delivery
000182 – Release Policy
000176 – Emergency Change
000170 – Service level
000168 – Availability Report
000167 – Project Charter
000164 – Release Unit
000159 – Release Management
000158 – Status Inquiry
000158 – Service catalog
000153 – Request for Change
000152 – Continual Service Improvement
000150 – Release Plan
000150 – Capacity Report
000144 – Capacity Plan
000142 – SKMS
000132 – Functional Management
000127 – Service Management System
000126 – Service Owner
000123 – Service Portfolio
000123 – Configuration Manager
000122 – Application Framework
000119 – Application Development
000117 – Budget Request
000113 – Compliance Management
000113 – Availability Plan
000111 – CMDB
000109 – Incident Closure
000108 – Standard Terms and Conditions
000108 – Risk Monitoring
000104 – Change Owner
000103 – Risk Management Policy
000102 – Acceptance Test
000100 – Incident Management
000099 – Identity management
000097 – Emergency Plan
000096 – Process Owner
000096 – Availability Management
000095 – Purchase Request
000094 – Event Review
000090 – Help desk
000088 – ISO/IEC 27001
000086 – Capacity Management
000086 – Application Management
000084 – Problem Management
000080 – Definitive Media Library
000079 – Change Management Policy
000077 – Configuration Audit
000076 – Process Evaluation
000074 – Incident Manager
000073 – Risk Register
000072 – Business case
000070 – Service Transition
000069 – Corrective and preventive action
000068 – RACI matrix
000066 – Service Charter
000066 – Problem Priority
000064 – Demand Management
000063 – Technical Analyst
000061 – Supplier Management
000060 – Service Design
000059 – Technical Management
000059 – Process Design
000059 – Process Architecture
000058 – ECAB
000057 – Application Manager
000057 – Application Developer
000056 – Test Model
000056 – Service Strategy
000054 – Test Manager
000054 – Process Audit
000054 – Business Relationship Manager
000053 – Supplier Manager
000053 – Service Catalogue
000051 – Change Evaluation
000050 – Risk Manager
000049 – Service Design Package
000049 – Incident Record
000047 – Service Portfolio Management
000047 – Facilities Management
000046 – Risk Management
000046 – Business impact analysis
000041 – Strategic Action Plan
000041 – COBIT
000039 – SLA Review
000039 – IT Operations Management
000037 – Process Architect
000030 – Demand Manager
000030 – Capacity Manager
000029 – IT Operations Manager
000028 – Security Management Information System
000028 – Knowledge Manager
000024 – Change Manager
000023 – Project Coordination
000023 – PDCA
000023 – Ishikawa diagram
000022 – Change Management
000020 – Program management
000018 – ISACA
000016 – Business Service Management
000015 – TM Forum
000015 – Lean manufacturing
000015 – IT Operator
000015 – Change Classification
000015 – Business Relationship Management
000015 – Availability Manager
000010 – Project Control
000008 – ISO/IEC 27002
000007 – Service Level Manager
000006 – Information and Communication Technology
000006 – Compliance Register
000005 – IT Service Management
000003 – PRINCE2
000000 – Axelos

Evaluation Criteria Definitions:

Interest and Popularity:

Leaders:

100 – Service Desk
100 – Emergency Change
100 – Continual Service Improvement

Google Trends data for gauging mindshare and awareness, the numbers are relative to their maximum (100), meaning number 100 has maximum interest right now and number 50 has half the interest it had from its peak of 100.

Employment Demand:

Leaders:

519511 – Operations Manager
252331 – Compliance Manager
106634 – Information Security Manager

Open employment opportunities on the date of this report for the subject. Indicator of the need of employers for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Active Practitioners:

Leaders:

06738366 – Change Management
05674323 – Program management
04466125 – Risk Management

Number of practitioners and professionals which have the subject skill set and experience. Indicator of the need of employers (and availability of employees) for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Monthly Searches:

Leaders:

110000 – PDCA
110000 – Call center
090500 – Risk Management

How often a month a search is performed for the keyword/phrase: and indicator of interest in the subject.

Cost per Click:

Leaders:

016.33 – Application Development
015.96 – Facilities Management
015.92 – IT Service Management

CPC: The average amount advertisers pay Google anytime someone clicks their own ad for this keyword. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Active Advertisers:

Leaders:

082 – Application Development
082 – Application Developer
065 – IT Service Management

This shows how many unique advertisers have appeared on this subject in the last 12 months. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Patents:

Leaders:

00078000 – Service Request
00062400 – Service level
00059000 – Request for Service

Patents issued for the specific subject. Indicator of R&D investments and innovation in the specific subject.

Books in print:

Leaders:

00084800 – Best practice
00058031 – IT Operator
00046200 – Risk Management

Number of in-print books that cover the subject. Indicator of the need for knowledge sharing and its availability.

Youtube content:

Leaders:

02320000 – Risk Management
00389000 – Call center
00169000 – Best practice

Number of youtube content videos that cover the subject. Indicator of the need for knowledge sharing and its availability.

Complete Overview:

Interest and Popularity

100 – Service Desk
100 – Emergency Change
100 – Continual Service Improvement
100 – Access and Identity Management
099 – Call center
098 – Support Request
098 – Service Request
098 – Change request
098 – Axelos
097 – Request for Change
097 – PDCA
096 – Request for Service
096 – Incident Report
096 – Customer Complaint
093 – RACI matrix
092 – Operations Manager
088 – Change Record
087 – Incident Manager
087 – Compliance Manager
084 – Service Delivery
084 – 5 Whys
083 – IT Operator
082 – Service Transition
082 – Release Build
082 – Fishbone diagram
081 – Application Manager
080 – Service Definition
080 – ITSM
079 – Service Support
079 – Availability Test
078 – SKMS
078 – Change Manager
077 – Technical Analyst
076 – Change Schedule
075 – Test Model
075 – Service Requirements
074 – Test Manager
074 – Service Owner
074 – Demand Manager
073 – Service Charter
073 – Release Planning
072 – Incident Closure
071 – Supplier Manager
070 – Problem Report
069 – Release Unit
069 – Capacity Plan
068 – ISO/IEC 27001
067 – Release Deployment
067 – Business Relationship Manager
066 – Change Classification
066 – Agile software development
065 – Status Inquiry
065 – Risk Monitoring
065 – Best practice
064 – Incident Management
063 – Service Model
063 – Process Area
062 – Service Operation
062 – Purchase Request
062 – Process Owner
062 – Capacity Report
061 – Configuration Manager
060 – Change Proposal
057 – Service Review
057 – Service Catalogue
057 – Release Policy
057 – Release Management
057 – Compliance Management
057 – Capacity Manager
056 – IT Operations Manager
055 – Project Charter
055 – Change Owner
054 – Service Portfolio
054 – Service Assessment
054 – Security Incident
054 – Risk Manager
053 – Process Audit
053 – Information and Communication Technology
053 – ECAB
053 – Customer Portfolio
052 – IT Operations Management
052 – Compliance Review
052 – Acceptance Test
051 – Access Management
050 – Request Fulfillment
050 – Ishikawa diagram
050 – Incident Resolution
050 – CMDB
050 – Availability Manager
049 – Application Management
048 – Risk Register
047 – Service Design
047 – Availability Management
046 – Service Level Manager
046 – Configuration Item
045 – Service Management System
045 – Process Evaluation
045 – PRINCE2
045 – ISACA
045 – Functional Management
045 – Compliance Register
044 – Security Review
044 – Help desk
044 – Application Framework
043 – Process Design
043 – ISO/IEC 27002
043 – Demand Management
042 – Service catalog
042 – Facilities Management
042 – Business Relationship Management
041 – Release Plan
041 – Project Coordination
041 – Change Management
040 – Supplier Management
040 – Service Strategy
040 – Service Portfolio Management
040 – Service level
040 – Information Security Manager
040 – Availability Plan
039 – SLA Review
039 – Project Control
039 – Identity management
038 – Risk Management Policy
038 – IT Service Management
038 – Incident Record
037 – Technical Management
037 – Knowledge Manager
037 – Change Evaluation
037 – Availability Report
036 – TM Forum
036 – Strategic Action Plan
036 – Program management
036 – Problem Identification
036 – Lean manufacturing
036 – Business impact analysis
036 – Application Development
035 – Process Architecture
035 – Process Architect
035 – Definitive Media Library
035 – Change Management Policy
034 – Service Design Package
034 – Risk Management
034 – Capacity Management
034 – Application Developer
033 – Security Management Information System
033 – Problem Management
033 – Budget Request
032 – Event Review
032 – Configuration Audit
032 – Business Service Management
032 – Business case
031 – Standard Terms and Conditions
031 – Problem Priority
031 – Emergency Plan
031 – Corrective and preventive action
031 – COBIT

Employment Demand:

519511 – Operations Manager
252331 – Compliance Manager
106634 – Information Security Manager
060571 – Risk Management
035658 – Change Management
034618 – Call center
030842 – Program management
030238 – Service Delivery
029893 – Application Development
020666 – Best practice
017096 – Service level
015527 – Help desk
013719 – Service Support
013546 – Service Desk
009211 – Lean manufacturing
007755 – Business case
007355 – Service Requirements
007241 – Facilities Management
007003 – Service Operation
005807 – Agile software development
005540 – Incident Management
005369 – Process Design
005345 – Service Model
005316 – Application Developer
004976 – Release Management
004507 – Problem Identification
004378 – Project Coordination
004147 – Problem Management
004084 – Access Management
002846 – Service Request
002821 – Identity management
002610 – Technical Management
002529 – ITSM
002463 – Supplier Management
002461 – Customer Complaint
002179 – Security Incident
002122 – Compliance Management
002063 – Compliance Review
002034 – COBIT
001876 – Acceptance Test
001811 – IT Service Management
001737 – Incident Report
001639 – Application Management
001611 – Risk Manager
001590 – Change request
001578 – Customer Portfolio
001570 – Capacity Management
001527 – Service Design
001516 – Configuration Manager
001235 – Technical Analyst
001211 – Incident Resolution
001184 – Release Planning
001137 – Project Control
001061 – Functional Management
001019 – Demand Management
000921 – Process Owner
000845 – Project Charter
000829 – CMDB
000800 – Test Manager
000773 – Service Strategy
000771 – Application Framework
000765 – Service Review
000596 – Service catalog
000573 – Service Portfolio
000540 – Process Area
000517 – PDCA
000506 – Corrective and preventive action
000466 – Security Review
000394 – ISACA
000390 – Process Evaluation
000387 – Application Manager
000377 – Change Schedule
000369 – Emergency Plan
000338 – Risk Monitoring
000330 – Release Deployment
000329 – Request Fulfillment
000323 – Process Audit
000317 – Problem Report
000317 – PRINCE2
000315 – Business Relationship Management
000314 – Service Assessment
000308 – Continual Service Improvement
000304 – Risk Register
000293 – Service Transition
000283 – Change Manager
000257 – Incident Manager
000248 – Release Plan
000244 – Business Relationship Manager
000242 – Business impact analysis
000237 – Request for Service
000235 – Support Request
000229 – Availability Management
000221 – Service Management System
000220 – Purchase Request
000205 – Risk Management Policy
000200 – Process Architecture
000200 – Capacity Plan
000195 – Change Proposal
000191 – Service Owner
000183 – ISO/IEC 27001
000178 – IT Operations Management
000161 – Budget Request
000156 – Service Definition
000156 – Knowledge Manager
000153 – 5 Whys
000150 – Request for Change
000136 – Availability Report
000114 – IT Operations Manager
000106 – Configuration Item
000105 – Information and Communication Technology
000099 – Service Catalogue
000090 – Process Architect
000089 – Standard Terms and Conditions
000087 – Release Build
000077 – Supplier Manager
000073 – Demand Manager
000073 – Change Management Policy
000072 – Event Review
000069 – Fishbone diagram
000067 – Access and Identity Management
000058 – Business Service Management
000046 – Configuration Audit
000043 – Change Record
000039 – Strategic Action Plan
000039 – Availability Test
000038 – Service Portfolio Management
000036 – Capacity Report
000033 – Capacity Manager
000031 – Emergency Change
000030 – Availability Plan
000028 – Test Model
000024 – Change Owner
000020 – Release Policy
000019 – Service Charter
000019 – ECAB
000018 – TM Forum
000018 – Change Evaluation
000017 – RACI matrix
000016 – Status Inquiry
000016 – Incident Closure
000015 – SLA Review
000014 – Incident Record
000013 – Release Unit
000011 – Service Level Manager
000011 – ISO/IEC 27002
000011 – Availability Manager
000010 – Ishikawa diagram
000008 – IT Operator
000007 – SKMS
000004 – Problem Priority
000004 – Definitive Media Library
000003 – Service Design Package
000001 – Compliance Register
000000 – Security Management Information System
000000 – Change Classification
000000 – Axelos

Active Practitioners:

06738366 – Change Management
05674323 – Program management
04466125 – Risk Management
02211492 – Lean manufacturing
01941912 – Operations Manager
01343196 – Service Delivery
01296626 – IT Service Management
01149298 – Call center
00907908 – Application Development
00775707 – Project Coordination
00759513 – Help desk
00646382 – Facilities Management
00552235 – Best practice
00448125 – PRINCE2
00444174 – Project Control
00402284 – Service level
00393086 – Process Design
00379080 – Service Desk
00353257 – Incident Management
00344031 – Business case
00317741 – Application Developer
00311010 – Service Support
00218962 – PDCA
00178709 – Release Management
00174739 – Risk Manager
00163724 – Technical Management
00163233 – Problem Management
00162022 – Supplier Management
00155462 – COBIT
00150825 – Technical Analyst
00123879 – Compliance Manager
00120147 – Service Design
00111018 – Identity management
00109210 – Test Manager
00107094 – Compliance Management
00097659 – ITSM
00097442 – ISACA
00095503 – Acceptance Test
00093490 – Change Manager
00093337 – Application Management
00088703 – Access Management
00086287 – Information and Communication Technology
00085960 – Business Relationship Management
00082092 – Change request
00075093 – Configuration Manager
00070713 – Axelos
00068119 – Demand Management
00064184 – Customer Complaint
00061973 – Capacity Management
00059547 – Process Owner
00059054 – Service Request
00058165 – Agile software development
00057092 – Service Operation
00055279 – Service Strategy
00054674 – Application Manager
00042565 – Customer Portfolio
00042489 – Service Requirements
00040190 – Service Model
00037502 – CMDB
00036186 – Functional Management
00034320 – Service Transition
00031546 – Compliance Review
00031543 – Process Audit
00030204 – Business Relationship Manager
00030132 – Incident Manager
00029090 – Problem Identification
00027777 – Project Charter
00027722 – Application Framework
00027443 – Security Incident
00027074 – Information Security Manager
00025239 – Service Portfolio
00024331 – Release Planning
00023676 – IT Operations Management
00022955 – Process Evaluation
00022863 – Corrective and preventive action
00022356 – IT Operations Manager
00020856 – Knowledge Manager
00020313 – Risk Monitoring
00020277 – Continual Service Improvement
00020034 – Risk Register
00019293 – Service Review
00019027 – Business impact analysis
00018209 – Demand Manager
00017263 – Incident Resolution
00015865 – Incident Report
00015846 – Service catalog
00014353 – Purchase Request
00014213 – ISO/IEC 27001
00013299 – Process Area
00011846 – Emergency Plan
00011832 – Process Architecture
00011695 – Business Service Management
00011212 – Availability Management
00011206 – Service Owner
00011128 – Release Deployment
00010706 – Service Catalogue
00010413 – Supplier Manager
00009806 – Security Review
00009581 – Capacity Plan
00009504 – Request for Change
00008507 – Process Architect
00007842 – Service Management System
00007548 – Risk Management Policy
00007470 – Service Level Manager
00006779 – Release Plan
00006691 – Request for Service
00006337 – Support Request
00006260 – Capacity Manager
00005957 – Request Fulfillment
00005642 – 5 Whys
00005567 – ISO/IEC 27002
00005002 – Service Definition
00004525 – Budget Request
00004432 – TM Forum
00004350 – IT Operator
00003824 – Problem Report
00003765 – Test Model
00003637 – Availability Manager
00003466 – Strategic Action Plan
00003352 – Service Assessment
00003244 – Change Management Policy
00003222 – Service Portfolio Management
00003145 – Change Proposal
00003112 – Release Build
00003002 – Availability Report
00002551 – Standard Terms and Conditions
00002453 – Event Review
00002316 – RACI matrix
00002282 – Fishbone diagram
00002144 – Ishikawa diagram
00002114 – Service Charter
00002021 – Change Schedule
00001922 – Configuration Item
00001912 – Configuration Audit
00001781 – Access and Identity Management
00001762 – Emergency Change
00001744 – ECAB
00001500 – SLA Review
00001488 – Capacity Report
00001441 – Change Record
00001295 – Change Evaluation
00001269 – Change Owner
00001080 – Incident Record
00001063 – Availability Plan
00001058 – Incident Closure
00001008 – Availability Test
00000694 – Compliance Register
00000658 – Status Inquiry
00000626 – Release Policy
00000548 – Release Unit
00000439 – Change Classification
00000384 – SKMS
00000207 – Service Design Package
00000188 – Problem Priority
00000176 – Definitive Media Library
00000120 – Security Management Information System

Monthly Searches:

110000 – PDCA
110000 – Call center
090500 – Risk Management
074000 – Lean manufacturing
074000 – Change Management
049500 – PRINCE2
040500 – ISACA
040500 – Help desk
040500 – COBIT
040500 – Best practice
033100 – ITSM
033100 – Fishbone diagram
027100 – Business case
022200 – Project Charter
022200 – Facilities Management
022200 – CMDB
018100 – Service Desk
018100 – Operations Manager
014800 – Incident Report
012100 – Agile software development
009900 – Ishikawa diagram
009900 – Incident Management
008100 – Program management
008100 – Information and Communication Technology
008100 – Application Manager
006600 – Service Definition
006600 – Risk Register
006600 – Release Management
006600 – Identity management
006600 – ECAB
006600 – 5 Whys
005400 – Application Development
004410 – Service Delivery
004410 – Risk Manager
004410 – IT Service Management
004410 – Demand Management
003600 – TM Forum
003600 – Process Design
003600 – Problem Management
003600 – Compliance Management
003600 – Change request
003600 – Capacity Management
003600 – Business impact analysis
002910 – Test Manager
002910 – Service level
002910 – Configuration Manager
002910 – Compliance Manager
002910 – Application Management
002910 – Access Management
002400 – Supplier Management
002400 – Service catalog
001890 – Technical Analyst
001890 – Service Request
001890 – Risk Management Policy
001890 – Project Control
001890 – Process Evaluation
001890 – Emergency Plan
001890 – Change Manager
001890 – Application Developer
001890 – Acceptance Test
001590 – Service Catalogue
001590 – Customer Complaint
001290 – Service Strategy
001290 – Process Owner
000990 – Problem Identification
000990 – Configuration Item
000990 – Business Relationship Management
000870 – Technical Management
000870 – Service Support
000870 – Service Model
000870 – Request for Change
000870 – Process Audit
000870 – Knowledge Manager
000870 – Corrective and preventive action
000870 – Business Service Management
000870 – Availability Management
000870 – Application Framework
000720 – Service Portfolio Management
000720 – IT Operations Manager
000720 – Demand Manager
000600 – Service Operation
000600 – Security Incident
000600 – Release Planning
000600 – Process Architecture
000600 – Compliance Review
000600 – Change Owner
000600 – Capacity Plan
000480 – Standard Terms and Conditions
000480 – Service Management System
000480 – Risk Monitoring
000480 – Request Fulfillment
000480 – IT Operations Management
000480 – Change Management Policy
000390 – Information Security Manager
000330 – Strategic Action Plan
000270 – Service Review
000270 – Security Review
000270 – Compliance Register
000210 – Supplier Manager
000210 – Capacity Manager
000180 – Configuration Audit
000090 – Incident Resolution
000000 – Test Model
000000 – Support Request
000000 – Status Inquiry
000000 – SLA Review
000000 – SKMS
000000 – Service Transition
000000 – Service Requirements
000000 – Service Portfolio
000000 – Service Owner
000000 – Service Level Manager
000000 – Service Design Package
000000 – Service Design
000000 – Service Charter
000000 – Service Assessment
000000 – Security Management Information System
000000 – Request for Service
000000 – Release Unit
000000 – Release Policy
000000 – Release Plan
000000 – Release Deployment
000000 – Release Build
000000 – RACI matrix
000000 – Purchase Request
000000 – Project Coordination
000000 – Process Area
000000 – Process Architect
000000 – Problem Report
000000 – Problem Priority
000000 – IT Operator
000000 – ISO/IEC 27002
000000 – ISO/IEC 27001
000000 – Incident Record
000000 – Incident Manager
000000 – Incident Closure
000000 – Functional Management
000000 – Event Review
000000 – Emergency Change
000000 – Definitive Media Library
000000 – Customer Portfolio
000000 – Continual Service Improvement
000000 – Change Schedule
000000 – Change Record
000000 – Change Proposal
000000 – Change Evaluation
000000 – Change Classification
000000 – Capacity Report
000000 – Business Relationship Manager
000000 – Budget Request
000000 – Axelos
000000 – Availability Test
000000 – Availability Report
000000 – Availability Plan
000000 – Availability Manager
000000 – Access and Identity Management

Cost per Click:

016.33 – Application Development
015.96 – Facilities Management
015.92 – IT Service Management
013.75 – IT Operations Management
013.64 – Incident Management
013.35 – Business Service Management
012.78 – Application Developer
012.34 – IT Operations Manager
011.36 – Agile software development
010.47 – Identity management
009.93 – Capacity Management
009.59 – Configuration Manager
009.52 – Help desk
009.45 – Security Incident
009.27 – Change Management Policy
009.23 – Service Portfolio Management
009.19 – CMDB
009.14 – Request Fulfillment
008.63 – Configuration Audit
008.58 – Supplier Manager
008.53 – Demand Manager
008.07 – Service Desk
008.04 – Configuration Item
007.93 – Access Management
007.65 – Technical Management
007.54 – Call center
007.42 – Corrective and preventive action
007.14 – ITSM
007.12 – Supplier Management
006.99 – Demand Management
006.91 – Application Manager
006.81 – Service Catalogue
006.52 – Service Definition
006.26 – Security Review
005.93 – Lean manufacturing
005.79 – Capacity Plan
005.76 – Application Management
005.47 – Compliance Management
005.29 – Incident Resolution
005.24 – Process Architecture
005.16 – Strategic Action Plan
005.12 – Risk Manager
005.06 – Risk Management
004.62 – Process Evaluation
004.58 – Release Management
004.58 – Program management
004.38 – Service level
004.28 – Change Management
003.95 – Change Manager
003.92 – Service catalog
003.90 – Technical Analyst
003.67 – Change Owner
003.63 – TM Forum
003.40 – Service Delivery
003.33 – Compliance Manager
003.02 – Business case
002.82 – PRINCE2
002.81 – Process Owner
002.70 – Service Model
002.30 – Request for Change
002.15 – Process Design
002.11 – Capacity Manager
002.09 – Test Manager
002.07 – Problem Management
001.86 – Service Strategy
001.84 – Service Request
001.64 – Emergency Plan
001.59 – Risk Management Policy
001.53 – Standard Terms and Conditions
001.41 – Release Planning
001.23 – Risk Register
001.11 – Customer Complaint
001.09 – Compliance Review
001.03 – Service Management System
000.94 – Project Control
000.86 – Service Review
000.83 – Information Security Manager
000.70 – Business impact analysis
000.64 – Risk Monitoring
000.57 – Process Audit
000.55 – Knowledge Manager
000.52 – Incident Report
000.50 – Availability Management
000.49 – Application Framework
000.42 – Problem Identification
000.34 – Project Charter
000.22 – Compliance Register
000.20 – Change request
000.19 – Acceptance Test
000.17 – Business Relationship Management
000.10 – Operations Manager
000.09 – Ishikawa diagram
000.06 – Information and Communication Technology
000.05 – PDCA
000.05 – ISACA
000.05 – 5 Whys
000.04 – Service Support
000.04 – Fishbone diagram
000.04 – Best practice
000.03 – ECAB
000.03 – COBIT
000.02 – Service Operation
000.00 – Test Model
000.00 – Support Request
000.00 – Status Inquiry
000.00 – SLA Review
000.00 – SKMS
000.00 – Service Transition
000.00 – Service Requirements
000.00 – Service Portfolio
000.00 – Service Owner
000.00 – Service Level Manager
000.00 – Service Design Package
000.00 – Service Design
000.00 – Service Charter
000.00 – Service Assessment
000.00 – Security Management Information System
000.00 – Request for Service
000.00 – Release Unit
000.00 – Release Policy
000.00 – Release Plan
000.00 – Release Deployment
000.00 – Release Build
000.00 – RACI matrix
000.00 – Purchase Request
000.00 – Project Coordination
000.00 – Process Area
000.00 – Process Architect
000.00 – Problem Report
000.00 – Problem Priority
000.00 – IT Operator
000.00 – ISO/IEC 27002
000.00 – ISO/IEC 27001
000.00 – Incident Record
000.00 – Incident Manager
000.00 – Incident Closure
000.00 – Functional Management
000.00 – Event Review
000.00 – Emergency Change
000.00 – Definitive Media Library
000.00 – Customer Portfolio
000.00 – Continual Service Improvement
000.00 – Change Schedule
000.00 – Change Record
000.00 – Change Proposal
000.00 – Change Evaluation
000.00 – Change Classification
000.00 – Capacity Report
000.00 – Business Relationship Manager
000.00 – Budget Request
000.00 – Axelos
000.00 – Availability Test
000.00 – Availability Report
000.00 – Availability Plan
000.00 – Availability Manager
000.00 – Access and Identity Management

Active Advertisers

082 – Application Development
082 – Application Developer
065 – IT Service Management
058 – Service Management System
057 – Risk Management
056 – Help desk
050 – Program management
050 – Identity management
047 – Business Service Management
044 – Compliance Management
044 – Call center
042 – Supplier Management
042 – Service Portfolio Management
041 – Service Desk
037 – Service Support
036 – IT Operations Management
036 – Application Management
034 – Agile software development
033 – Incident Management
033 – Access Management
032 – Lean manufacturing
030 – Change Management
029 – Facilities Management
027 – Emergency Plan
026 – ITSM
025 – Service catalog
018 – Corrective and preventive action
018 – Capacity Plan
017 – Risk Management Policy
017 – Release Management
017 – Information Security Manager
016 – Service Catalogue
016 – Process Audit
016 – IT Operations Manager
016 – Business impact analysis
015 – Capacity Management
015 – Business Relationship Management
014 – Risk Monitoring
014 – Risk Manager
014 – Change Management Policy
013 – Process Design
012 – Technical Management
012 – Service Delivery
012 – Problem Management
011 – Supplier Manager
011 – Strategic Action Plan
011 – Incident Report
011 – Demand Management
011 – Customer Complaint
011 – Compliance Manager
010 – Security Incident
010 – Fishbone diagram
010 – Configuration Manager
010 – CMDB
009 – Security Review
009 – Knowledge Manager
009 – Compliance Review
009 – Availability Management
007 – Change Manager
007 – Application Manager
006 – Risk Register
006 – Application Framework
005 – Standard Terms and Conditions
004 – Service Strategy
004 – Project Charter
004 – Incident Manager
003 – Test Manager
003 – Request Fulfillment
003 – COBIT
003 – 5 Whys
002 – Service Request
002 – Service Operation
002 – Release Planning
002 – Project Control
002 – PRINCE2
002 – ISACA
002 – Information and Communication Technology
002 – Incident Resolution
002 – Customer Portfolio
002 – Configuration Item
002 – Compliance Register
001 – TM Forum
001 – Service Model
001 – Service level
001 – Request for Change
001 – Operations Manager
001 – Capacity Manager
001 – Acceptance Test
000 – Test Model
000 – Technical Analyst
000 – Support Request
000 – Status Inquiry
000 – SLA Review
000 – SKMS
000 – Service Transition
000 – Service Review
000 – Service Requirements
000 – Service Portfolio
000 – Service Owner
000 – Service Level Manager
000 – Service Design Package
000 – Service Design
000 – Service Definition
000 – Service Charter
000 – Service Assessment
000 – Security Management Information System
000 – Request for Service
000 – Release Unit
000 – Release Policy
000 – Release Plan
000 – Release Deployment
000 – Release Build
000 – RACI matrix
000 – Purchase Request
000 – Project Coordination
000 – Process Owner
000 – Process Evaluation
000 – Process Area
000 – Process Architecture
000 – Process Architect
000 – Problem Report
000 – Problem Priority
000 – Problem Identification
000 – PDCA
000 – IT Operator
000 – ISO/IEC 27002
000 – ISO/IEC 27001
000 – Ishikawa diagram
000 – Incident Record
000 – Incident Closure
000 – Functional Management
000 – Event Review
000 – Emergency Change
000 – ECAB
000 – Demand Manager
000 – Definitive Media Library
000 – Continual Service Improvement
000 – Configuration Audit
000 – Change Schedule
000 – Change request
000 – Change Record
000 – Change Proposal
000 – Change Owner
000 – Change Evaluation
000 – Change Classification
000 – Capacity Report
000 – Business Relationship Manager
000 – Business case
000 – Budget Request
000 – Best practice
000 – Axelos
000 – Availability Test
000 – Availability Report
000 – Availability Plan
000 – Availability Manager
000 – Access and Identity Management

Patents:

00078000 – Service Request
00062400 – Service level
00059000 – Request for Service
00049600 – Call center
00048000 – Application Development
00032500 – Service Delivery
00032500 – Process Design
00031200 – Risk Management
00027700 – Service Requirements
00027200 – Access Management
00022800 – Service Management System
00022800 – Information Security Manager
00022700 – Application Management
00021400 – Information and Communication Technology
00020700 – Change request
00019600 – Application Developer
00018500 – Application Framework
00017500 – Service Support
00016700 – Test Model
00014200 – Identity management
00013300 – Best practice
00013100 – Service Operation
00011900 – Compliance Register
00011900 – Application Manager
00011100 – Service Model
00010700 – Purchase Request
00010400 – RACI matrix
00010400 – Program management
00010300 – Change Management
00010200 – Request for Change
00009900 – Configuration Manager
00009830 – Help desk
00006900 – Capacity Management
00006400 – Service Definition
00006390 – Release Unit
00006370 – Process Area
00005360 – Status Inquiry
00004960 – Business case
00004690 – IT Operations Manager
00004690 – Facilities Management
00004110 – Process Architect
00004110 – Demand Management
00003910 – Acceptance Test
00003380 – Process Evaluation
00003080 – Configuration Item
00003060 – Availability Management
00002990 – Service Design
00002830 – Compliance Management
00002820 – Service Desk
00002570 – Security Incident
00002420 – Service Design Package
00002420 – Problem Identification
00002420 – Business Service Management
00002340 – Incident Management
00002240 – Release Management
00002220 – Operations Manager
00002190 – Process Architecture
00002120 – Technical Management
00002110 – Risk Monitoring
00001960 – Support Request
00001960 – SLA Review
00001960 – Incident Report
00001930 – CMDB
00001930 – Change Record
00001870 – Service catalog
00001720 – Problem Management
00001450 – Project Control
00001360 – Customer Complaint
00001240 – Test Manager
00001190 – Risk Manager
00001140 – Problem Report
00001020 – Process Owner
00000986 – Strategic Action Plan
00000986 – IT Service Management
00000906 – Supplier Management
00000891 – Emergency Plan
00000839 – Service Strategy
00000824 – Lean manufacturing
00000803 – Service Portfolio
00000771 – Request Fulfillment
00000663 – ITSM
00000646 – Service Owner
00000620 – Process Audit
00000614 – PRINCE2
00000614 – PDCA
00000603 – Functional Management
00000593 – Service Assessment
00000582 – Knowledge Manager
00000580 – Change Evaluation
00000559 – Standard Terms and Conditions
00000559 – Security Management Information System
00000559 – Business Relationship Manager
00000559 – Business Relationship Management
00000559 – Access and Identity Management
00000559 – 5 Whys
00000554 – Change Manager
00000521 – Security Review
00000513 – Change Schedule
00000490 – Agile software development
00000488 – Customer Portfolio
00000485 – Compliance Manager
00000478 – Business impact analysis
00000445 – Event Review
00000430 – Service Review
00000428 – Availability Manager
00000413 – Compliance Review
00000406 – Configuration Audit
00000404 – Availability Report
00000396 – Incident Record
00000387 – Release Build
00000369 – Incident Resolution
00000368 – Capacity Plan
00000363 – Risk Management Policy
00000359 – Availability Test
00000339 – Change Classification
00000316 – Capacity Manager
00000314 – Service Catalogue
00000295 – Axelos
00000278 – Service Transition
00000277 – Change Owner
00000271 – Release Plan
00000263 – Service Charter
00000263 – Capacity Report
00000259 – Release Planning
00000245 – COBIT
00000227 – Incident Manager
00000217 – IT Operator
00000214 – Service Level Manager
00000207 – IT Operations Management
00000201 – Change Proposal
00000199 – Budget Request
00000192 – Release Policy
00000163 – Project Coordination
00000156 – Emergency Change
00000139 – Release Deployment
00000139 – Demand Manager
00000127 – TM Forum
00000126 – Problem Priority
00000116 – Project Charter
00000116 – Fishbone diagram
00000104 – Corrective and preventive action
00000096 – Technical Analyst
00000090 – Risk Register
00000076 – SKMS
00000073 – ISO/IEC 27002
00000073 – ISO/IEC 27001
00000073 – ISACA
00000072 – Supplier Manager
00000067 – Service Portfolio Management
00000067 – Continual Service Improvement
00000057 – ECAB
00000041 – Availability Plan
00000030 – Ishikawa diagram
00000028 – Incident Closure
00000000 – Definitive Media Library
00000000 – Change Management Policy

Books in print:

00084800 – Best practice
00058031 – IT Operator
00046200 – Risk Management
00023874 – Information and Communication Technology
00020522 – IT Operations Management
00018275 – Service Delivery
00016710 – Change Management
00011894 – Call center
00011768 – Application Development
00011453 – Business case
00009799 – IT Service Management
00009770 – Service level
00008666 – 5 Whys
00007912 – Customer Complaint
00006768 – Service Support
00005835 – Help desk
00005310 – Facilities Management
00004020 – Operations Manager
00003676 – Incident Report
00003314 – Emergency Plan
00003286 – Change request
00002996 – Service Operation
00002918 – Demand Management
00002904 – Incident Management
00002801 – Budget Request
00002628 – Application Developer
00002428 – Service Model
00002413 – Lean manufacturing
00002259 – Service Request
00002042 – Acceptance Test
00002008 – Identity management
00001996 – Agile software development
00001901 – Process Evaluation
00001813 – Service Design
00001763 – Service Desk
00001741 – Service Review
00001728 – Problem Identification
00001699 – Request for Change
00001646 – Problem Management
00001636 – PRINCE2
00001613 – Application Management
00001579 – Process Owner
00001516 – Security Incident
00001478 – Service Requirements
00001465 – Service Strategy
00001400 – Security Review
00001386 – Application Framework
00001367 – Fishbone diagram
00001350 – Test Model
00001320 – Access Management
00001251 – Configuration Item
00001203 – Configuration Manager
00001160 – Capacity Management
00001156 – Project Charter
00001133 – Risk Register
00000968 – Business impact analysis
00000940 – Problem Report
00000912 – Technical Analyst
00000901 – Request for Service
00000859 – Process Area
00000853 – Risk Management Policy
00000826 – Change Manager
00000823 – ISO/IEC 27001
00000725 – Supplier Management
00000716 – Change Schedule
00000713 – Compliance Review
00000712 – COBIT
00000686 – Process Architecture
00000656 – Compliance Management
00000654 – Service Definition
00000631 – Release Management
00000606 – Ishikawa diagram
00000604 – ITSM
00000578 – PDCA
00000577 – Service catalog
00000556 – Continual Service Improvement
00000540 – Service Portfolio
00000523 – Standard Terms and Conditions
00000512 – Availability Management
00000492 – Support Request
00000448 – Release Plan
00000447 – Change Proposal
00000428 – Service Transition
00000419 – Change Record
00000398 – Knowledge Manager
00000391 – Test Manager
00000382 – Purchase Request
00000379 – ISACA
00000360 – Capacity Plan
00000345 – Risk Monitoring
00000345 – Functional Management
00000339 – Application Manager
00000337 – Release Planning
00000335 – Information Security Manager
00000328 – CMDB
00000322 – Release Build
00000320 – Change Management Policy
00000313 – Process Audit
00000303 – Incident Record
00000302 – Business Relationship Management
00000300 – Change Owner
00000289 – Event Review
00000280 – Service Management System
00000262 – Release Deployment
00000241 – Configuration Audit
00000240 – Service Owner
00000240 – Service Catalogue
00000238 – Change Evaluation
00000236 – Release Policy
00000236 – Emergency Change
00000221 – Service Portfolio Management
00000221 – Project Coordination
00000212 – Customer Portfolio
00000207 – Problem Priority
00000193 – Change Classification
00000193 – Axelos
00000188 – Release Unit
00000184 – Compliance Manager
00000182 – RACI matrix
00000151 – SKMS
00000144 – Incident Manager
00000140 – Availability Report
00000132 – Service Level Manager
00000130 – Incident Resolution
00000126 – Definitive Media Library
00000120 – Business Relationship Manager
00000090 – Capacity Report
00000086 – Demand Manager
00000086 – Availability Plan
00000074 – TM Forum
00000070 – Service Charter
00000070 – Security Management Information System
00000068 – Capacity Manager
00000063 – Status Inquiry
00000062 – Supplier Manager
00000061 – Process Architect
00000061 – Incident Closure
00000060 – Service Design Package
00000047 – Availability Test
00000043 – Access and Identity Management
00000025 – SLA Review
00000000 – Technical Management
00000000 – Strategic Action Plan
00000000 – Service Assessment
00000000 – Risk Manager
00000000 – Request Fulfillment
00000000 – Project Control
00000000 – Program management
00000000 – Process Design
00000000 – IT Operations Manager
00000000 – ISO/IEC 27002
00000000 – ECAB
00000000 – Corrective and preventive action
00000000 – Compliance Register
00000000 – Business Service Management
00000000 – Availability Manager

Youtube content:

02320000 – Risk Management
00389000 – Call center
00169000 – Best practice
00145000 – Business case
00145000 – Application Development
00137000 – Change Management
00109000 – Help desk
00084400 – Service Delivery
00075200 – Lean manufacturing
00060700 – Service Review
00056700 – Operations Manager
00056400 – Test Model
00043700 – Event Review
00043300 – Service Desk
00029500 – ITSM
00027700 – Service Design
00024500 – Configuration Manager
00024000 – Security Review
00023700 – Facilities Management
00023600 – PDCA
00021700 – Incident Management
00020600 – Program management
00019800 – Identity management
00019100 – PRINCE2
00017100 – Technical Analyst
00015300 – IT Service Management
00015300 – Access Management
00015200 – Project Control
00014700 – COBIT
00014200 – Application Developer
00013200 – Incident Report
00013200 – Agile software development
00012900 – Service Support
00012800 – Service level
00012600 – Information and Communication Technology
00012300 – Service Model
00012100 – Risk Manager
00012100 – Process Design
00011200 – Release Build
00009680 – Emergency Plan
00009420 – ECAB
00008870 – Application Framework
00008830 – Customer Complaint
00008700 – Service Request
00008370 – Application Management
00007850 – ISACA
00007730 – Release Management
00007620 – Service catalog
00007580 – Acceptance Test
00007480 – CMDB
00007340 – SKMS
00007330 – Test Manager
00007330 – Service Strategy
00007200 – Budget Request
00007120 – Compliance Management
00006980 – Service Operation
00006370 – Project Charter
00006140 – Application Manager
00005780 – 5 Whys
00005690 – Security Incident
00005190 – Capacity Management
00005170 – Fishbone diagram
00004660 – TM Forum
00004610 – Change request
00004480 – Problem Management
00004310 – Business Service Management
00004270 – Demand Management
00003860 – Service Portfolio
00003790 – Compliance Manager
00003540 – Support Request
00003500 – Problem Report
00003350 – Supplier Management
00003050 – Release Plan
00002920 – Risk Register
00002890 – Change Manager
00002720 – Service Transition
00002540 – Ishikawa diagram
00002490 – Service Management System
00002470 – Release Planning
00002420 – Change Proposal
00002410 – IT Operations Management
00002400 – ISO/IEC 27001
00002230 – Service Requirements
00002020 – Business impact analysis
00001930 – Problem Identification
00001900 – Axelos
00001810 – Service Owner
00001780 – Technical Management
00001670 – Change Record
00001590 – Availability Management
00001570 – Process Evaluation
00001550 – Standard Terms and Conditions
00001530 – Purchase Request
00001530 – Information Security Manager
00001520 – Continual Service Improvement
00001510 – Business Relationship Management
00001480 – Project Coordination
00001430 – Service Charter
00001260 – Service Definition
00001120 – Process Architecture
00000950 – Incident Manager
00000915 – Service Catalogue
00000912 – Release Policy
00000873 – Request Fulfillment
00000863 – Change Schedule
00000862 – Compliance Review
00000857 – Risk Monitoring
00000850 – Release Unit
00000845 – Change Owner
00000801 – Process Audit
00000727 – Request for Change
00000639 – Process Area
00000635 – Strategic Action Plan
00000585 – Service Portfolio Management
00000559 – Knowledge Manager
00000546 – Business Relationship Manager
00000535 – Availability Manager
00000522 – Customer Portfolio
00000510 – Corrective and preventive action
00000480 – Configuration Item
00000442 – Process Owner
00000440 – Service Assessment
00000381 – Request for Service
00000352 – Functional Management
00000337 – Risk Management Policy
00000322 – IT Operations Manager
00000316 – IT Operator
00000313 – Availability Report
00000283 – Status Inquiry
00000283 – Incident Resolution
00000276 – ISO/IEC 27002
00000268 – RACI matrix
00000263 – Incident Record
00000262 – Demand Manager
00000235 – Availability Test
00000227 – Capacity Plan
00000198 – Emergency Change
00000150 – Supplier Manager
00000139 – Process Architect
00000131 – Configuration Audit
00000127 – Change Evaluation
00000120 – Release Deployment
00000119 – SLA Review
00000107 – Capacity Manager
00000092 – Capacity Report
00000077 – Service Level Manager
00000056 – Service Design Package
00000053 – Compliance Register
00000035 – Availability Plan
00000026 – Definitive Media Library
00000018 – Problem Priority
00000017 – Access and Identity Management
00000012 – Change Management Policy
00000011 – Change Classification
00000003 – Security Management Information System
00000002 – Incident Closure

Start with Compliance Manager, Information Security Manager, Operations Manager, and make the above top Predictive Analytics results happen:

Access all the ITIL Prescriptive Analytics Compliance Manager, Information Security Manager, Operations Manager, blueprints, presentations and templates and much more in The Art of Service LAB theartofservice.co/lab. Sign up for 7 days free today.

Cybersecurity PREDICTIVE ANALYTICS REPORT

Read online and subscribe to Predictive Analytics Email Updates HERE

You can have a say in which analytics you need in which timeframe: simply add your (anonymous) need to the list at
theartofservice.com/predictive-analytics-topics-reports-urgency and we will make analytics available for your topic.

This Cybersecurity report evaluates technologies and applications in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

The Predictive Analytics Scores below – ordered on Forecasted Future Needs and Demand from High to Low – shows you Cybersecurity’s Predictive Analysis. The link takes you to a corresponding product in The Art of Service’s store to get started.

The Art of Service’s predictive model results enable businesses to discover and apply the most profitable technologies and applications, attracting the most profitable customers, and therefore helping maximize value from their investments. The Predictive Analytics algorithm evaluates and scores technologies and applications.

The platform monitors over six thousand technologies and applications for months, looking for interest swings in a topic, concept, technology or application, not just a count of mentions. It then makes forecasts about the velocity of the interest over time, with peaks representing it breaking into the mainstream. Data sources include trend data, employment data, employee skills data, and signals like advertising spent, advertisers, search-counts, youtube activity, patents, and books published.

Predictive Analytics Scores:

005800 – CCNA CyberOps
005634 – GPEN
001865 – EDRP
001688 – GCED
001469 – HCISSP
001338 – OSWE
001278 – GSLC
001255 – USCYBERCOM
001145 – OSCP
001029 – Cyber security standards
001012 – Secure coding
000878 – Insider threat
000846 – ENDP
000808 – Kill chain
000765 – GSNA
000749 – GCIH
000671 – Credentialing
000668 – CSSLP
000621 – OWASP
000604 – GXPN
000597 – ECIH
000528 – Multi-factor authentication
000520 – Security engineering
000513 – GWAPT
000512 – GSEC
000385 – Software Defined Perimeter
000370 – OSEE
000354 – Advanced persistent threat
000352 – Data integrity
000341 – Open security
000333 – GREM
000331 – GAWN
000324 – GCFA
000308 – Endpoint security
000300 – Honeypot (computing)
000299 – CCISO
000272 – Two factor authentication
000263 – CIPP
000257 – Privilege escalation
000253 – CCNA Security
000252 – GIAC
000245 – Offensive Security
000234 – Offensive Security Certified Professional
000234 – Biometric
000232 – Certified Cloud Security Professional
000223 – NIST
000218 – Apache Hadoop
000205 – Application security
000191 – Chain of trust
000185 – CISSP
000183 – Data security
000182 – CCFP
000182 – Application software
000176 – Common Vulnerabilities and Exposures
000172 – GCPM
000167 – Phishing
000150 – CCNP Security
000143 – GCIA
000142 – CIPT
000136 – GCFE
000136 – Cloud computing security
000134 – Information security awareness
000132 – Code review
000127 – Two-factor authentication
000125 – Penetration test
000120 – National Cyber Security Policy 2013
000118 – Security breach
000117 – GISF
000117 – Disk encryption
000113 – GISP
000112 – Attack tree
000104 – CCIE Security
000102 – Content security
000099 – ECES
000098 – Identity management
000098 – CIPM
000097 – Intrusion prevention system
000097 – Encryption
000087 – Information security
000086 – Cyber-attack
000086 – Bulletproof hosting
000086 – Access Control Systems
000083 – Cyber hygiene
000082 – Principle of least privilege
000080 – GIAC Certified Penetration Tester
000080 – Data breach
000079 – Trusted Platform Module
000076 – Mobile security
000073 – Access control
000072 – Licensed Penetration Tester
000071 – Cipher
000067 – Digital certificate
000065 – Code injection
000063 – US-CERT
000062 – Canadian Cyber Incident Response Centre
000061 – GCWN
000060 – Ashley Madison data breach
000056 – Systems Security Certified Practitioner
000055 – Computer Emergency Readiness Team
000052 – Phone cloning
000052 – Clickjacking
000052 – Botnet
000051 – Identity theft
000050 – Physical security
000050 – Morris worm
000048 – Certified Ethical Hacker
000044 – ECRE
000044 – Certified Information Systems Security Professional
000043 – OSCE
000043 – Forensics
000042 – OSWP
000042 – Data logging
000040 – Threat modelling
000040 – GLEG
000036 – SeL4
000036 – GPPA
000036 – Data loss prevention software
000036 – Computer emergency response team
000035 – Access control list
000034 – ECVP
000031 – GIAC Certified Windows Security Administrator
000030 – Denial of service
000029 – Programmable logic controller
000029 – EMAPT
000028 – Cryptography
000027 – Spoofing attack
000027 – Physical firewall
000027 – Internet security
000025 – Certified in Risk and Information Systems Control
000024 – Cyberwarfare
000023 – Quantified Self
000023 – IAPP
000023 – GIAC Security Leadership
000023 – EWPT
000023 – Antivirus software
000022 – Intrusion detection system
000022 – Firewall (networking)
000022 – Anonymous (group)
000021 – Secure by design
000021 – PikeOS
000021 – Distributed denial of service
000020 – National Security Agency
000020 – Certified Information Security Manager
000019 – GIAC Certified Incident Handler
000019 – Fail-safe
000018 – Network security
000017 – Social engineering (security)
000017 – ISACA
000017 – CAPTCHA
000015 – Cryptanalysis
000014 – Computer security
000013 – Fast flux
000012 – Secunia
000012 – Certified Information Systems Auditor
000011 – CHPSE
000010 – Internet privacy
000010 – CertiVox
000009 – Privacy software
000009 – EJPT
000008 – Internet Crime Complaint Center
000007 – Certified Information Privacy Professional
000006 – TERENA
000006 – Rootkit
000006 – Keystroke logging
000006 – Denial-of-service attack
000005 – Physical information security
000005 – Cybercrime
000005 – Cisco Certified Network Associate
000005 – Advanced Encryption Standard
000004 – INTEGRITY-178B
000004 – EC-Council Certified Security Analyst
000004 – Digital object identifier
000004 – Computer Fraud and Abuse Act
000004 – Anti-virus software
000003 – InfraGard
000003 – Certified Penetration Testing Engineer
000002 – Stuxnet
000002 – Keylogger
000001 – Security by design
000001 – National White Collar Crime Center
000001 – National Cyber Security Division
000001 – Mile2
000001 – Cyberterrorism
000001 – Cryptosystem
000001 – Automated theorem proving
000000 – Vulnerability (computing)
000000 – Trusted Computer System Evaluation Criteria
000000 – Symmetric-key algorithm
000000 – Social engineering (computer security)
000000 – Separation of protection and security
000000 – Security-focused operating system
000000 – Security-evaluated operating system
000000 – Sandbox (computer security)
000000 – Risk cybernetics
000000 – Public-key encryption
000000 – Proactive cyber defence
000000 – Presumed security
000000 – Packet capture appliance
000000 – Offensive Security Wireless Professional
000000 – Offensive Security Web Expert
000000 – Offensive Security Exploitation Expert
000000 – Offensive Security Certified Expert
000000 – National Cyberdefence Centre
000000 – Mobile secure gateway
000000 – Information Systems Security Management Professional
000000 – Information Systems Security Engineering Professional
000000 – Information Systems Security Architecture Professional
000000 – Identity-based security
000000 – HealthCare Information Security and Privacy Practitioner
000000 – GSSP-NET
000000 – GSSP-JAVA
000000 – Gordon-Loeb Model
000000 – GIAC Systems and Network Auditor
000000 – GIAC Security Expert
000000 – GIAC Security Essentials Certification
000000 – GIAC Secure Software Programmer
000000 – GIAC Reverse Engineering Malware
000000 – GIAC Law of Data Security and Investigations
000000 – GIAC Information Security Professional
000000 – GIAC Information Security Fundamentals
000000 – GIAC Exploit Researcher and Advanced Penetration Tester
000000 – GIAC Certified Web Application Penetration Tester
000000 – GIAC Certified Unix Security Administrator
000000 – GIAC Certified Project Manager
000000 – GIAC Certified Perimeter Protection Analyst
000000 – GIAC Certified Intrusion Analyst
000000 – GIAC Certified Forensics Examiner
000000 – GIAC Certified Forensic Analyst
000000 – GIAC Certified Enterprise Defender
000000 – GIAC Assessing Wireless Networks
000000 – GCUX
000000 – Full disclosure (computer security)
000000 – Firewall (computing)
000000 – Exploit (computer security)
000000 – Evaluation Assurance Level
000000 – European Information Technologies Certification Institute
000000 – European Information Technologies Certification Academy
000000 – Error-tolerant design
000000 – ELearnSecurity Web Application Penetration Tester
000000 – ELearnSecurity Network Defense Professional
000000 – ELearnSecurity Mobile Application Penetration Tester
000000 – ELearnSecurity Certified Reverse Engineer
000000 – ELearnSecurity Certified Professional Penetration Tester
000000 – ELearnSecurity Certified Junior Penetration Tester
000000 – ECPPT Gold
000000 – ECCSP
000000 – EC-Council Network Security Administrator
000000 – EC-Council Disaster Recovery Professional
000000 – EC-Council Certified VoIP Professional
000000 – EC-Council Certified Secure Programmer
000000 – EC-Council Certified Incident Handler
000000 – EC-Council Certified Encryption Specialist
000000 – Differentiated security
000000 – Defense in depth (computing)
000000 – Data-centric security
000000 – Cyber-security regulation
000000 – Cyber-Insurance
000000 – Cryptographic protocol
000000 – CPTE Certified Penetration Testing Engineer
000000 – Cisco Certified Network Professional
000000 – Cisco Certified Network Professional
000000 – Cisco Certified Internetwork Expert
000000 – Certified Secure Software Lifecycle Professional
000000 – Certified Network Defense Architect
000000 – Certified Information Privacy Technologist
000000 – Certified Information Privacy Manager
000000 – Certified HIPAA Security Expert
000000 – Certified HIPAA Privacy Security Expert
000000 – Certified Hacking Forensic Investigator
000000 – Certified Cyber Forensics Professional
000000 – Certified Chief Information Security Officer
000000 – Certified Authorization Professional
000000 – CERT Coordination Center
000000 – Capability-based security
000000 – Backdoor (computing)
000000 – Attack (computing)

Evaluation Criteria Definitions:

Interest and Popularity:

Leaders:

100 – Software Defined Perimeter
100 – OWASP
100 – GAWN

Google Trends data for gauging mindshare and awareness, the numbers are relative to their maximum (100), meaning number 100 has maximum interest right now and number 50 has half the interest it had from its peak of 100.

Employment Demand:

Leaders:

024668 – Credentialing
018492 – Information security
012634 – Data integrity

Open employment opportunities on the date of this report for the subject. Indicator of the need of employers for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Active Practitioners:

Leaders:

01496047 – Network security
00635512 – Information security
00424850 – Physical security

Number of practitioners and professionals which have the subject skill set and experience. Indicator of the need of employers (and availability of employees) for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Monthly Searches:

Leaders:

368000 – OSCE
246000 – Keylogger
165000 – Phishing

How often a month a search is performed for the keyword/phrase: and indicator of interest in the subject.

Cost per Click:

Leaders:

044.32 – EC-Council Disaster Recovery Professional
038.59 – Cloud computing security
018.32 – Data loss prevention software

CPC: The average amount advertisers pay Google anytime someone clicks their own ad for this keyword. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Active Advertisers:

Leaders:

066 – Access Control Systems
063 – Network security
057 – Access control

This shows how many unique advertisers have appeared on this subject in the last 12 months. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Patents:

Leaders:

11100000 – Access control
10400000 – Encryption
00169000 – Application software

Patents issued for the specific subject. Indicator of R&D investments and innovation in the specific subject.

Books in print:

Leaders:

00024844 – Forensics
00017932 – Access control
00014852 – Computer security

Number of in-print books that cover the subject. Indicator of the need for knowledge sharing and its availability.

Youtube content:

Leaders:

00706000 – Cipher
00665000 – EMAPT
00433000 – CIPT

Number of youtube content videos that cover the subject. Indicator of the need for knowledge sharing and its availability.

Complete Overview:

Interest and Popularity

100 – Software Defined Perimeter
100 – OWASP
100 – GAWN
098 – Code injection
096 – Two factor authentication
094 – Endpoint security
094 – Cloud computing security
087 – CCNA Security
084 – OSCP
083 – Attack tree
080 – HCISSP
079 – Apache Hadoop
075 – Insider threat
075 – CIPM
074 – TERENA
074 – Multi-factor authentication
070 – Open security
070 – CIPP
070 – Cipher
069 – OSCE
069 – Offensive Security
067 – ECES
066 – GSNA
063 – OSEE
063 – Offensive Security Certified Professional
060 – Certified Cloud Security Professional
059 – CCNP Security
058 – Phishing
058 – CCNA CyberOps
058 – CAPTCHA
058 – Biometric
054 – Penetration test
054 – Data security
053 – Secure coding
053 – Privilege escalation
053 – Content security
052 – PikeOS
052 – Data integrity
052 – CIPT
050 – Security engineering
050 – GISP
049 – ENDP
048 – CCFP
046 – GCED
045 – Trusted Platform Module
045 – Quantified Self
044 – Two-factor authentication
044 – ISACA
044 – GREM
044 – CCISO
043 – Application security
042 – Social engineering (security)
041 – IAPP
041 – Certified in Risk and Information Systems Control
040 – GWAPT
040 – GSLC
040 – Disk encryption
040 – Credentialing
038 – Identity management
038 – GCIH
038 – Digital certificate
036 – Spoofing attack
036 – GPEN
036 – CSSLP
036 – Advanced persistent threat
035 – Information security awareness
034 – GXPN
033 – Mobile security
033 – Data loss prevention software
033 – Cyber security standards
033 – Code review
032 – GCFA
032 – ECIH
032 – Data breach
031 – Physical security
031 – Certified Ethical Hacker
031 – CCIE Security
031 – Application software
030 – Security by design
030 – Information security
030 – Fast flux
030 – Botnet
029 – OSWE
029 – Intrusion prevention system
029 – Data logging
029 – Access control
028 – Security breach
028 – Encryption
027 – GIAC
027 – Cyberwarfare
026 – Secure by design
026 – EDRP
026 – Chain of trust
025 – USCYBERCOM
025 – SeL4
025 – Physical information security
025 – Kill chain
025 – GSEC
025 – GLEG
025 – Forensics
025 – Digital object identifier
024 – Phone cloning
023 – Network security
023 – ECRE
023 – Cyber hygiene
022 – NIST
022 – Computer security
022 – Access Control Systems
021 – Internet security
021 – GIAC Certified Windows Security Administrator
021 – EMAPT
021 – CISSP
020 – Licensed Penetration Tester
019 – Anonymous (group)
018 – EJPT
018 – Cryptography
018 – Cisco Certified Network Associate – Security
018 – CHPSE
017 – Threat modelling
017 – Firewall (networking)
017 – Common Vulnerabilities and Exposures
016 – Mile2
016 – Fail-safe
016 – Cyber-attack
016 – Clickjacking
016 – Certified Penetration Testing Engineer
015 – Principle of least privilege
015 – Cryptosystem
015 – Antivirus software
014 – Programmable logic controller
014 – Physical firewall
014 – GCIA
014 – GCFE
014 – Computer Fraud and Abuse Act
014 – Access control list
013 – GCPM
013 – Canadian Cyber Incident Response Centre
012 – Keylogger
012 – Identity theft
012 – Honeypot (computing)
012 – Cryptanalysis
012 – Computer Emergency Readiness Team
011 – GIAC Certified Penetration Tester
011 – Certified Information Systems Security Professional
010 – GISF
010 – Distributed denial of service
009 – Privacy software
009 – OSWP
009 – Morris worm
009 – GPPA
009 – Denial of service
009 – Cybercrime
009 – CertiVox
008 – Secunia
008 – Intrusion detection system
008 – Internet privacy
008 – InfraGard
008 – GCWN
008 – Cyberterrorism
007 – ECVP
007 – EC-Council Certified Security Analyst
007 – Advanced Encryption Standard
006 – US-CERT
006 – National Security Agency
006 – National Cyber Security Policy 2013
006 – GIAC Certified Incident Handler
006 – EWPT
006 – Denial-of-service attack
006 – Certified Information Systems Auditor
006 – Certified Information Security Manager
006 – Bulletproof hosting
005 – Systems Security Certified Practitioner
005 – Keystroke logging
005 – Internet Crime Complaint Center
005 – Computer emergency response team
005 – Certified Information Privacy Professional
004 – Stuxnet
004 – National White Collar Crime Center
003 – Rootkit
003 – INTEGRITY-178B
003 – GIAC Security Leadership
003 – Certified Hacking Forensic Investigator
003 – Automated theorem proving
003 – Ashley Madison data breach
001 – National Cyber Security Division
001 – Anti-virus software
000 – Vulnerability (computing)
000 – Trusted Computer System Evaluation Criteria
000 – Symmetric-key algorithm
000 – Social engineering (computer security)
000 – Separation of protection and security
000 – Security-focused operating system
000 – Security-evaluated operating system
000 – Sandbox (computer security)
000 – Risk cybernetics
000 – Public-key encryption
000 – Proactive cyber defence
000 – Presumed security
000 – Packet capture appliance
000 – Offensive Security Wireless Professional
000 – Offensive Security Web Expert
000 – Offensive Security Exploitation Expert
000 – Offensive Security Certified Expert
000 – National Cyberdefence Centre
000 – Mobile secure gateway
000 – Information Systems Security Management Professional
000 – Information Systems Security Engineering Professional
000 – Information Systems Security Architecture Professional
000 – Identity-based security
000 – HealthCare Information Security and Privacy Practitioner
000 – GSSP-NET
000 – GSSP-JAVA
000 – Gordon-Loeb Model
000 – GIAC Systems and Network Auditor
000 – GIAC Security Expert
000 – GIAC Security Essentials Certification
000 – GIAC Secure Software Programmer – Java
000 – GIAC Reverse Engineering Malware
000 – GIAC Law of Data Security and Investigations
000 – GIAC Information Security Professional
000 – GIAC Information Security Fundamentals
000 – GIAC Exploit Researcher and Advanced Penetration Tester
000 – GIAC Certified Web Application Penetration Tester
000 – GIAC Certified Unix Security Administrator
000 – GIAC Certified Project Manager
000 – GIAC Certified Perimeter Protection Analyst
000 – GIAC Certified Intrusion Analyst
000 – GIAC Certified Forensics Examiner
000 – GIAC Certified Forensic Analyst
000 – GIAC Certified Enterprise Defender
000 – GIAC Assessing Wireless Networks
000 – GCUX
000 – Full disclosure (computer security)
000 – Firewall (computing)
000 – Exploit (computer security)
000 – Evaluation Assurance Level
000 – European Information Technologies Certification Institute
000 – European Information Technologies Certification Academy
000 – Error-tolerant design
000 – ELearnSecurity Web Application Penetration Tester
000 – ELearnSecurity Network Defense Professional
000 – ELearnSecurity Mobile Application Penetration Tester
000 – ELearnSecurity Certified Reverse Engineer
000 – ELearnSecurity Certified Professional Penetration Tester
000 – ELearnSecurity Certified Junior Penetration Tester
000 – ECPPT Gold
000 – ECCSP
000 – EC-Council Network Security Administrator
000 – EC-Council Disaster Recovery Professional
000 – EC-Council Certified VoIP Professional
000 – EC-Council Certified Secure Programmer
000 – EC-Council Certified Incident Handler
000 – EC-Council Certified Encryption Specialist
000 – Differentiated security
000 – Defense in depth (computing)
000 – Data-centric security
000 – Cyber-security regulation
000 – Cyber-Insurance
000 – Cryptographic protocol
000 – CPTE Certified Penetration Testing Engineer
000 – Cisco Certified Network Professional – Security
000 – Cisco Certified Network Professional – CyberOps
000 – Cisco Certified Internetwork Expert – Security
000 – Certified Secure Software Lifecycle Professional
000 – Certified Network Defense Architect
000 – Certified Information Privacy Technologist
000 – Certified Information Privacy Manager
000 – Certified HIPAA Security Expert
000 – Certified HIPAA Privacy Security Expert
000 – Certified Cyber Forensics Professional
000 – Certified Chief Information Security Officer
000 – Certified Authorization Professional
000 – CERT Coordination Center
000 – Capability-based security
000 – Backdoor (computing)
000 – Attack (computing)

Employment Demand:

024668 – Credentialing
018492 – Information security
012634 – Data integrity
012592 – CISSP
011796 – Network security
008823 – Access control
007772 – Application software
006834 – Physical security
006340 – Encryption
005126 – NIST
004525 – Application security
004351 – Data security
003804 – Forensics
003146 – Code review
002817 – Identity management
002654 – Biometric
002449 – Security engineering
002238 – GIAC
002120 – Computer security
001785 – GSEC
001512 – Cryptography
001489 – Certified Information Systems Security Professional
001448 – Identity theft
001383 – GCIH
001155 – OWASP
001070 – Access Control Systems
000989 – CCNA Security
000877 – Internet security
000869 – Secure coding
000784 – GCIA
000759 – Certified Information Systems Auditor
000739 – Endpoint security
000554 – Mobile security
000528 – GSLC
000503 – Certified Ethical Hacker
000496 – OSCP
000493 – GPEN
000490 – Certified Information Security Manager
000473 – Apache Hadoop
000466 – National Security Agency
000464 – CIPP
000462 – USCYBERCOM
000444 – Anti-virus software
000434 – Insider threat
000405 – Phishing
000382 – GCED
000375 – ISACA
000353 – Multi-factor authentication
000328 – Programmable logic controller
000325 – Intrusion detection system
000320 – Information security awareness
000308 – CSSLP
000305 – GCFA
000296 – Two-factor authentication
000291 – Two factor authentication
000268 – GWAPT
000259 – EDRP
000230 – Kill chain
000224 – CCNP Security
000222 – Data logging
000214 – Denial of service
000205 – Security breach
000202 – Disk encryption
000182 – Penetration test
000182 – Antivirus software
000172 – Cybercrime
000169 – Offensive Security
000158 – Intrusion prevention system
000158 – GREM
000158 – Cyber-attack
000157 – OSCE
000157 – GSNA
000155 – Computer emergency response team
000153 – Systems Security Certified Practitioner
000151 – GISP
000149 – GCFE
000144 – Cyber security standards
000139 – Data breach
000135 – CCIE Security
000135 – Advanced persistent threat
000134 – GIAC Certified Incident Handler
000111 – GXPN
000111 – CIPM
000105 – Content security
000101 – US-CERT
000093 – Certified Authorization Professional
000089 – Cipher
000088 – Offensive Security Certified Professional
000085 – Fail-safe
000085 – Access control list
000084 – GIAC Certified Intrusion Analyst
000084 – CCFP
000075 – GIAC Security Essentials Certification
000070 – GIAC Security Leadership
000070 – Certified Information Privacy Professional
000069 – CIPT
000066 – Certified Secure Software Lifecycle Professional
000065 – GCWN
000065 – GCPM
000062 – Public-key encryption
000057 – Digital certificate
000056 – GISF
000053 – IAPP
000051 – Cloud computing security
000049 – Certified in Risk and Information Systems Control
000047 – GCUX
000044 – GIAC Certified Forensic Analyst
000044 – Botnet
000042 – OSWE
000041 – Distributed denial of service
000039 – ENDP
000038 – Open security
000036 – Cryptanalysis
000035 – GPPA
000034 – OSEE
000032 – Cyber-Insurance
000031 – Privilege escalation
000031 – OSWP
000031 – GIAC Reverse Engineering Malware
000030 – InfraGard
000029 – GIAC Certified Penetration Tester
000028 – Rootkit
000027 – GIAC Systems and Network Auditor
000026 – Licensed Penetration Tester
000026 – Information Systems Security Engineering Professional
000025 – GAWN
000025 – ECIH
000024 – Offensive Security Certified Expert
000024 – Internet privacy
000023 – ECES
000023 – EC-Council Certified Incident Handler
000022 – Certified Cloud Security Professional
000021 – Information Systems Security Architecture Professional
000021 – GSSP-JAVA
000021 – CCISO
000020 – Threat modelling
000020 – Common Vulnerabilities and Exposures
000019 – GIAC Security Expert
000018 – Trusted Platform Module
000018 – Secure by design
000018 – GIAC Certified Enterprise Defender
000018 – ECVP
000016 – HealthCare Information Security and Privacy Practitioner
000016 – Data-centric security
000015 – Secunia
000015 – Cisco Certified Network Associate – Security
000015 – Chain of trust
000013 – Quantified Self
000012 – Principle of least privilege
000012 – Offensive Security Exploitation Expert
000012 – ECRE
000011 – Firewall (networking)
000011 – Cryptographic protocol
000010 – GIAC Information Security Fundamentals
000010 – GIAC Exploit Researcher and Advanced Penetration Tester
000010 – CAPTCHA
000010 – Capability-based security
000010 – Advanced Encryption Standard
000009 – Security by design
000009 – HCISSP
000009 – GSSP-NET
000009 – GIAC Information Security Professional
000009 – EC-Council Certified Security Analyst
000009 – Denial-of-service attack
000009 – Computer Emergency Readiness Team
000008 – Information Systems Security Management Professional
000008 – Clickjacking
000008 – Cisco Certified Network Professional – Security
000008 – Cisco Certified Internetwork Expert – Security
000007 – GIAC Certified Windows Security Administrator
000007 – GIAC Certified Web Application Penetration Tester
000007 – Cyberwarfare
000007 – Certified Information Privacy Manager
000007 – Certified Cyber Forensics Professional
000006 – Privacy software
000005 – GLEG
000005 – EWPT
000005 – Code injection
000004 – Packet capture appliance
000004 – Differentiated security
000004 – Certified Chief Information Security Officer
000003 – Physical information security
000003 – Offensive Security Wireless Professional
000003 – Offensive Security Web Expert
000003 – Identity-based security
000003 – GIAC Certified Unix Security Administrator
000003 – Cyber hygiene
000002 – Stuxnet
000002 – Software Defined Perimeter
000002 – Physical firewall
000002 – GIAC Secure Software Programmer – Java
000002 – GIAC Certified Perimeter Protection Analyst
000002 – GIAC Certified Forensics Examiner
000002 – EC-Council Certified Secure Programmer
000002 – Defense in depth (computing)
000002 – Data loss prevention software
000002 – Cyber-security regulation
000002 – Anonymous (group)
000001 – Social engineering (security)
000001 – SeL4
000001 – National Cyber Security Division
000001 – Mile2
000001 – Keylogger
000001 – GIAC Certified Project Manager
000001 – ELearnSecurity Web Application Penetration Tester
000001 – CPTE Certified Penetration Testing Engineer
000001 – Certified Information Privacy Technologist
000001 – Automated theorem proving
000001 – Attack tree
000000 – Vulnerability (computing)
000000 – Trusted Computer System Evaluation Criteria
000000 – TERENA
000000 – Symmetric-key algorithm
000000 – Spoofing attack
000000 – Social engineering (computer security)
000000 – Separation of protection and security
000000 – Security-focused operating system
000000 – Security-evaluated operating system
000000 – Sandbox (computer security)
000000 – Risk cybernetics
000000 – Proactive cyber defence
000000 – Presumed security
000000 – PikeOS
000000 – Phone cloning
000000 – National White Collar Crime Center
000000 – National Cyberdefence Centre
000000 – National Cyber Security Policy 2013
000000 – Morris worm
000000 – Mobile secure gateway
000000 – Keystroke logging
000000 – Internet Crime Complaint Center
000000 – INTEGRITY-178B
000000 – Honeypot (computing)
000000 – Gordon-Loeb Model
000000 – GIAC Law of Data Security and Investigations
000000 – GIAC Assessing Wireless Networks
000000 – Full disclosure (computer security)
000000 – Firewall (computing)
000000 – Fast flux
000000 – Exploit (computer security)
000000 – Evaluation Assurance Level
000000 – European Information Technologies Certification Institute
000000 – European Information Technologies Certification Academy
000000 – Error-tolerant design
000000 – EMAPT
000000 – ELearnSecurity Network Defense Professional
000000 – ELearnSecurity Mobile Application Penetration Tester
000000 – ELearnSecurity Certified Reverse Engineer
000000 – ELearnSecurity Certified Professional Penetration Tester
000000 – ELearnSecurity Certified Junior Penetration Tester
000000 – EJPT
000000 – ECPPT Gold
000000 – ECCSP
000000 – EC-Council Network Security Administrator
000000 – EC-Council Disaster Recovery Professional
000000 – EC-Council Certified VoIP Professional
000000 – EC-Council Certified Encryption Specialist
000000 – Digital object identifier
000000 – Cyberterrorism
000000 – Cryptosystem
000000 – Computer Fraud and Abuse Act
000000 – Cisco Certified Network Professional – CyberOps
000000 – CHPSE
000000 – CertiVox
000000 – Certified Penetration Testing Engineer
000000 – Certified Network Defense Architect
000000 – Certified HIPAA Security Expert
000000 – Certified HIPAA Privacy Security Expert
000000 – Certified Hacking Forensic Investigator
000000 – CERT Coordination Center
000000 – CCNA CyberOps
000000 – Canadian Cyber Incident Response Centre
000000 – Bulletproof hosting
000000 – Backdoor (computing)
000000 – Attack (computing)
000000 – Ashley Madison data breach

Active Practitioners:

01496047 – Network security
00635512 – Information security
00424850 – Physical security
00352436 – Access control
00321851 – Computer security
00221395 – Forensics
00186825 – Data integrity
00182955 – Encryption
00147020 – Credentialing
00142687 – CISSP
00132351 – Application software
00128735 – Data security
00108939 – Identity management
00098931 – Cryptography
00095083 – ISACA
00094961 – Application security
00078430 – Code review
00069348 – Internet security
00065683 – Biometric
00050479 – NIST
00037000 – Certified Information Systems Security Professional
00036535 – Certified Information Systems Auditor
00034061 – CCNA Security
00033844 – Identity theft
00033696 – Cybercrime
00032152 – Certified Ethical Hacker
00027411 – Access Control Systems
00025407 – OSCE
00024448 – Security by design
00023944 – GIAC
00023901 – Mobile security
00023533 – Security engineering
00022523 – Endpoint security
00018596 – OWASP
00017145 – Apache Hadoop
00016050 – Programmable logic controller
00015384 – Data logging
00014924 – Certified Information Security Manager
00014078 – Phishing
00013879 – National Security Agency
00012535 – Anti-virus software
00012345 – CIPP
00012059 – Antivirus software
00011737 – Intrusion detection system
00010275 – Two-factor authentication
00010275 – Two factor authentication
00009540 – IAPP
00008833 – CCNP Security
00008813 – Cipher
00008722 – GSEC
00008475 – CIPM
00008385 – Information security awareness
00007916 – Certified in Risk and Information Systems Control
00007868 – Penetration test
00007696 – GCIA
00007619 – InfraGard
00007098 – Fail-safe
00007020 – GCIH
00006907 – Disk encryption
00006700 – GISP
00006378 – Denial of service
00005708 – Cisco Certified Network Associate – Security
00005538 – Data breach
00005432 – Content security
00004946 – Multi-factor authentication
00004875 – Security breach
00004771 – Certified Information Privacy Professional
00004763 – Offensive Security
00004719 – Intrusion prevention system
00004552 – Secure coding
00004289 – GIAC Certified Incident Handler
00004030 – CCIE Security
00003706 – Insider threat
00003640 – OSCP
00003520 – Cloud computing security
00003360 – CAPTCHA
00003358 – Access control list
00003235 – Digital certificate
00003008 – GCFA
00002954 – Cryptanalysis
00002935 – Cyber-attack
00002545 – Botnet
00002527 – CIPT
00002509 – Quantified Self
00002366 – Offensive Security Certified Professional
00002221 – GIAC Security Essentials Certification
00002221 – CCFP
00002189 – Secure by design
00002146 – Computer emergency response team
00002088 – GWAPT
00002087 – GREM
00001919 – Distributed denial of service
00001872 – Internet privacy
00001819 – GIAC Certified Intrusion Analyst
00001661 – CSSLP
00001653 – GSLC
00001651 – GIAC Certified Forensic Analyst
00001593 – EC-Council Certified Security Analyst
00001549 – ECES
00001538 – GCFE
00001524 – Cisco Certified Network Professional – Security
00001415 – Rootkit
00001412 – Mile2
00001379 – Physical information security
00001373 – Advanced persistent threat
00001371 – Systems Security Certified Practitioner
00001354 – GSNA
00001345 – Advanced Encryption Standard
00001313 – Cyber-Insurance
00001291 – Cryptosystem
00001244 – TERENA
00001058 – GIAC Reverse Engineering Malware
00001041 – GCED
00001021 – Trusted Platform Module
00001000 – Public-key encryption
00000986 – Secunia
00000958 – US-CERT
00000920 – USCYBERCOM
00000908 – GIAC Security Leadership
00000883 – Certified Secure Software Lifecycle Professional
00000878 – GPPA
00000856 – GCWN
00000855 – Threat modelling
00000853 – Firewall (networking)
00000839 – Denial-of-service attack
00000796 – Cyberwarfare
00000780 – Open security
00000756 – GAWN
00000751 – Code injection
00000723 – Licensed Penetration Tester
00000713 – Certified Information Privacy Manager
00000712 – Kill chain
00000703 – Certified Authorization Professional
00000666 – National White Collar Crime Center
00000661 – OSWP
00000644 – Cyberterrorism
00000642 – GIAC Systems and Network Auditor
00000640 – Privilege escalation
00000631 – Privacy software
00000630 – ECRE
00000625 – GXPN
00000615 – Certified Hacking Forensic Investigator
00000608 – GIAC Certified Enterprise Defender
00000592 – Certified Chief Information Security Officer
00000585 – Information Systems Security Architecture Professional
00000579 – OSEE
00000578 – Offensive Security Wireless Professional
00000571 – Digital object identifier
00000569 – Certified Cloud Security Professional
00000544 – Keylogger
00000538 – Certified Information Privacy Technologist
00000519 – Stuxnet
00000490 – GCPM
00000482 – Certified Penetration Testing Engineer
00000477 – GISF
00000467 – GIAC Certified Windows Security Administrator
00000464 – Certified Network Defense Architect
00000462 – Cyber security standards
00000438 – GIAC Information Security Professional
00000426 – Cisco Certified Internetwork Expert – Security
00000417 – GIAC Exploit Researcher and Advanced Penetration Tester
00000404 – Information Systems Security Management Professional
00000399 – GIAC Certified Penetration Tester
00000386 – Computer Fraud and Abuse Act
00000372 – ECVP
00000361 – EDRP
00000360 – GCUX
00000337 – Offensive Security Certified Expert
00000319 – EC-Council Network Security Administrator
00000317 – HealthCare Information Security and Privacy Practitioner
00000316 – Cryptographic protocol
00000315 – GPEN
00000315 – GLEG
00000309 – CCISO
00000289 – GSSP-JAVA
00000274 – GIAC Information Security Fundamentals
00000273 – Data-centric security
00000252 – Social engineering (security)
00000245 – Clickjacking
00000244 – PikeOS
00000242 – Information Systems Security Engineering Professional
00000229 – Fast flux
00000226 – ENDP
00000223 – Automated theorem proving
00000219 – Principle of least privilege
00000219 – GIAC Secure Software Programmer – Java
00000204 – Chain of trust
00000202 – EJPT
00000195 – Computer Emergency Readiness Team
00000193 – Common Vulnerabilities and Exposures
00000191 – GIAC Certified Perimeter Protection Analyst
00000190 – GIAC Certified Unix Security Administrator
00000188 – National Cyber Security Division
00000184 – Data loss prevention software
00000176 – Anonymous (group)
00000168 – CHPSE
00000161 – ELearnSecurity Certified Professional Penetration Tester
00000148 – Certified HIPAA Privacy Security Expert
00000147 – Identity-based security
00000141 – Certified Cyber Forensics Professional
00000135 – Spoofing attack
00000134 – ECIH
00000130 – EWPT
00000126 – GSSP-NET
00000117 – EC-Council Certified Secure Programmer
00000104 – Physical firewall
00000102 – EC-Council Disaster Recovery Professional
00000097 – GIAC Law of Data Security and Investigations
00000096 – European Information Technologies Certification Institute
00000093 – CertiVox
00000091 – Symmetric-key algorithm
00000091 – OSWE
00000090 – EC-Council Certified Incident Handler
00000088 – GIAC Certified Web Application Penetration Tester
00000087 – GIAC Security Expert
00000084 – INTEGRITY-178B
00000084 – CERT Coordination Center
00000083 – Cyber hygiene
00000081 – Keystroke logging
00000081 – CPTE Certified Penetration Testing Engineer
00000074 – Attack tree
00000072 – EMAPT
00000069 – SeL4
00000067 – ELearnSecurity Web Application Penetration Tester
00000063 – Internet Crime Complaint Center
00000061 – GIAC Certified Project Manager
00000056 – Evaluation Assurance Level
00000055 – ECPPT Gold
00000052 – Software Defined Perimeter
00000052 – Certified HIPAA Security Expert
00000049 – HCISSP
00000047 – GIAC Certified Forensics Examiner
00000046 – Phone cloning
00000041 – GIAC Assessing Wireless Networks
00000041 – European Information Technologies Certification Academy
00000039 – Cyber-security regulation
00000034 – ELearnSecurity Mobile Application Penetration Tester
00000032 – Capability-based security
00000026 – Offensive Security Exploitation Expert
00000023 – Trusted Computer System Evaluation Criteria
00000023 – EC-Council Certified Encryption Specialist
00000021 – Canadian Cyber Incident Response Centre
00000018 – Morris worm
00000018 – Error-tolerant design
00000017 – ELearnSecurity Network Defense Professional
00000016 – Differentiated security
00000015 – Social engineering (computer security)
00000015 – Firewall (computing)
00000013 – Risk cybernetics
00000013 – ELearnSecurity Certified Reverse Engineer
00000012 – Packet capture appliance
00000011 – Proactive cyber defence
00000010 – Offensive Security Web Expert
00000008 – Vulnerability (computing)
00000008 – EC-Council Certified VoIP Professional
00000007 – Bulletproof hosting
00000005 – Security-focused operating system
00000005 – National Cyber Security Policy 2013
00000005 – Attack (computing)
00000005 – Ashley Madison data breach
00000004 – Honeypot (computing)
00000003 – Mobile secure gateway
00000003 – Gordon-Loeb Model
00000002 – Sandbox (computer security)
00000002 – Presumed security
00000002 – ECCSP
00000002 – Backdoor (computing)
00000000 – Separation of protection and security
00000000 – Security-evaluated operating system
00000000 – National Cyberdefence Centre
00000000 – Full disclosure (computer security)
00000000 – Exploit (computer security)
00000000 – ELearnSecurity Certified Junior Penetration Tester
00000000 – Defense in depth (computing)
00000000 – Cisco Certified Network Professional – CyberOps
00000000 – CCNA CyberOps

Monthly Searches:

368000 – OSCE
246000 – Keylogger
165000 – Phishing
135000 – CAPTCHA
110000 – Botnet
090500 – Identity theft
074000 – NIST
074000 – CISSP
060500 – Internet security
060500 – Antivirus software
049500 – Rootkit
049500 – Encryption
049500 – Cryptography
040500 – OWASP
040500 – ISACA
040500 – Cipher
033100 – Stuxnet
033100 – GPEN
027100 – Network security
027100 – Forensics
027100 – Application software
022200 – Secunia
022200 – Information security
018100 – Mobile security
018100 – Cybercrime
018100 – Computer security
014800 – Two-factor authentication
014800 – Two factor authentication
014800 – National Security Agency
014800 – IAPP
014800 – Biometric
014800 – Access control
012100 – Denial of service
012100 – Data integrity
012100 – CCNA Security
009900 – Intrusion detection system
009900 – GIAC
009900 – CIPP
009900 – CIPM
008100 – Security breach
008100 – Programmable logic controller
008100 – Offensive Security
008100 – Data security
008100 – Data breach
008100 – Certified Ethical Hacker
006600 – Trusted Platform Module
006600 – OSCP
006600 – Internet privacy
006600 – Identity management
006600 – Digital certificate
006600 – Code review
006600 – CCFP
005400 – Penetration test
005400 – InfraGard
005400 – GISP
005400 – Credentialing
005400 – CCNP Security
005400 – Access Control Systems
005400 – Access control list
004410 – Physical security
004410 – Intrusion prevention system
004410 – Endpoint security
004410 – Advanced persistent threat
003600 – GSEC
003600 – Cryptanalysis
002910 – Computer Fraud and Abuse Act
002910 – Cloud computing security
002910 – CCIE Security
002910 – Advanced Encryption Standard
002400 – GSLC
002400 – Application security
001890 – Secure by design
001890 – Internet Crime Complaint Center
001890 – GPPA
001890 – GAWN
001890 – Distributed denial of service
001890 – Data logging
001590 – Kill chain
001590 – GCFA
001590 – Disk encryption
001590 – Digital object identifier
001290 – Security engineering
001290 – Insider threat
001290 – Cyberterrorism
000990 – Spoofing attack
000990 – Privilege escalation
000990 – Certified Information Systems Security Professional
000870 – Secure coding
000870 – Offensive Security Certified Professional
000870 – GISF
000870 – Cryptosystem
000720 – Privacy software
000720 – Computer emergency response team
000720 – Bulletproof hosting
000600 – Security by design
000600 – National White Collar Crime Center
000480 – Keystroke logging
000480 – Information security awareness
000480 – Content security
000480 – Common Vulnerabilities and Exposures
000480 – Certified Information Security Manager
000390 – Open security
000390 – Data loss prevention software
000390 – Attack tree
000330 – Licensed Penetration Tester
000330 – Automated theorem proving
000210 – Systems Security Certified Practitioner
000210 – Software Defined Perimeter
000210 – National Cyber Security Division
000210 – EC-Council Certified Security Analyst
000180 – EC-Council Network Security Administrator
000150 – Trusted Computer System Evaluation Criteria
000120 – Certified Hacking Forensic Investigator
000090 – Offensive Security Certified Expert
000090 – CERT Coordination Center
000030 – Information Systems Security Engineering Professional
000030 – EC-Council Disaster Recovery Professional
000030 – EC-Council Certified Secure Programmer
000000 – Vulnerability (computing)
000000 – USCYBERCOM
000000 – US-CERT
000000 – Threat modelling
000000 – TERENA
000000 – Symmetric-key algorithm
000000 – Social engineering (security)
000000 – Social engineering (computer security)
000000 – Separation of protection and security
000000 – SeL4
000000 – Security-focused operating system
000000 – Security-evaluated operating system
000000 – Sandbox (computer security)
000000 – Risk cybernetics
000000 – Quantified Self
000000 – Public-key encryption
000000 – Proactive cyber defence
000000 – Principle of least privilege
000000 – Presumed security
000000 – PikeOS
000000 – Physical information security
000000 – Physical firewall
000000 – Phone cloning
000000 – Packet capture appliance
000000 – OSWP
000000 – OSWE
000000 – OSEE
000000 – Offensive Security Wireless Professional
000000 – Offensive Security Web Expert
000000 – Offensive Security Exploitation Expert
000000 – National Cyberdefence Centre
000000 – National Cyber Security Policy 2013
000000 – Multi-factor authentication
000000 – Morris worm
000000 – Mobile secure gateway
000000 – Mile2
000000 – INTEGRITY-178B
000000 – Information Systems Security Management Professional
000000 – Information Systems Security Architecture Professional
000000 – Identity-based security
000000 – Honeypot (computing)
000000 – HealthCare Information Security and Privacy Practitioner
000000 – HCISSP
000000 – GXPN
000000 – GWAPT
000000 – GSSP-NET
000000 – GSSP-JAVA
000000 – GSNA
000000 – GREM
000000 – Gordon-Loeb Model
000000 – GLEG
000000 – GIAC Systems and Network Auditor
000000 – GIAC Security Leadership
000000 – GIAC Security Expert
000000 – GIAC Security Essentials Certification
000000 – GIAC Secure Software Programmer – Java
000000 – GIAC Reverse Engineering Malware
000000 – GIAC Law of Data Security and Investigations
000000 – GIAC Information Security Professional
000000 – GIAC Information Security Fundamentals
000000 – GIAC Exploit Researcher and Advanced Penetration Tester
000000 – GIAC Certified Windows Security Administrator
000000 – GIAC Certified Web Application Penetration Tester
000000 – GIAC Certified Unix Security Administrator
000000 – GIAC Certified Project Manager
000000 – GIAC Certified Perimeter Protection Analyst
000000 – GIAC Certified Penetration Tester
000000 – GIAC Certified Intrusion Analyst
000000 – GIAC Certified Incident Handler
000000 – GIAC Certified Forensics Examiner
000000 – GIAC Certified Forensic Analyst
000000 – GIAC Certified Enterprise Defender
000000 – GIAC Assessing Wireless Networks
000000 – GCWN
000000 – GCUX
000000 – GCPM
000000 – GCIH
000000 – GCIA
000000 – GCFE
000000 – GCED
000000 – Full disclosure (computer security)
000000 – Firewall (networking)
000000 – Firewall (computing)
000000 – Fast flux
000000 – Fail-safe
000000 – Exploit (computer security)
000000 – EWPT
000000 – Evaluation Assurance Level
000000 – European Information Technologies Certification Institute
000000 – European Information Technologies Certification Academy
000000 – Error-tolerant design
000000 – ENDP
000000 – EMAPT
000000 – ELearnSecurity Web Application Penetration Tester
000000 – ELearnSecurity Network Defense Professional
000000 – ELearnSecurity Mobile Application Penetration Tester
000000 – ELearnSecurity Certified Reverse Engineer
000000 – ELearnSecurity Certified Professional Penetration Tester
000000 – ELearnSecurity Certified Junior Penetration Tester
000000 – EJPT
000000 – EDRP
000000 – ECVP
000000 – ECRE
000000 – ECPPT Gold
000000 – ECIH
000000 – ECES
000000 – ECCSP
000000 – EC-Council Certified VoIP Professional
000000 – EC-Council Certified Incident Handler
000000 – EC-Council Certified Encryption Specialist
000000 – Differentiated security
000000 – Denial-of-service attack
000000 – Defense in depth (computing)
000000 – Data-centric security
000000 – Cyberwarfare
000000 – Cyber-security regulation
000000 – Cyber-Insurance
000000 – Cyber-attack
000000 – Cyber security standards
000000 – Cyber hygiene
000000 – CSSLP
000000 – Cryptographic protocol
000000 – CPTE Certified Penetration Testing Engineer
000000 – Computer Emergency Readiness Team
000000 – Code injection
000000 – Clickjacking
000000 – Cisco Certified Network Professional – Security
000000 – Cisco Certified Network Professional – CyberOps
000000 – Cisco Certified Network Associate – Security
000000 – Cisco Certified Internetwork Expert – Security
000000 – CIPT
000000 – CHPSE
000000 – Chain of trust
000000 – CertiVox
000000 – Certified Secure Software Lifecycle Professional
000000 – Certified Penetration Testing Engineer
000000 – Certified Network Defense Architect
000000 – Certified Information Systems Auditor
000000 – Certified Information Privacy Technologist
000000 – Certified Information Privacy Professional
000000 – Certified Information Privacy Manager
000000 – Certified in Risk and Information Systems Control
000000 – Certified HIPAA Security Expert
000000 – Certified HIPAA Privacy Security Expert
000000 – Certified Cyber Forensics Professional
000000 – Certified Cloud Security Professional
000000 – Certified Chief Information Security Officer
000000 – Certified Authorization Professional
000000 – CCNA CyberOps
000000 – CCISO
000000 – Capability-based security
000000 – Canadian Cyber Incident Response Centre
000000 – Backdoor (computing)
000000 – Attack (computing)
000000 – Ashley Madison data breach
000000 – Apache Hadoop
000000 – Anti-virus software
000000 – Anonymous (group)

Cost per Click:

044.32 – EC-Council Disaster Recovery Professional
038.59 – Cloud computing security
018.32 – Data loss prevention software
014.94 – Licensed Penetration Tester
014.77 – Network security
014.27 – Advanced persistent threat
012.57 – Endpoint security
011.11 – EC-Council Network Security Administrator
010.61 – Intrusion prevention system
010.47 – Identity management
010.41 – Data security
010.26 – Systems Security Certified Practitioner
010.14 – Intrusion detection system
010.13 – Certified Information Security Manager
009.99 – Privilege escalation
009.81 – Information Systems Security Engineering Professional
009.48 – Mobile security
008.84 – Advanced Encryption Standard
008.83 – Penetration test
008.70 – Botnet
007.87 – Spoofing attack
007.80 – Secure by design
007.70 – Data breach
007.68 – Identity theft
007.51 – Certified Hacking Forensic Investigator
007.26 – Common Vulnerabilities and Exposures
007.13 – Certified Ethical Hacker
006.87 – GISP
006.79 – Computer Fraud and Abuse Act
006.78 – Distributed denial of service
006.48 – Content security
006.43 – Application security
006.31 – Two factor authentication
006.30 – Trusted Platform Module
006.29 – Code review
006.26 – Access control list
006.25 – EC-Council Certified Secure Programmer
005.99 – Digital certificate
005.95 – Security breach
005.82 – Information security
005.64 – CERT Coordination Center
005.52 – Insider threat
005.50 – GCFA
005.48 – Two-factor authentication
005.15 – CCIE Security
005.08 – Application software
005.02 – Computer emergency response team
004.92 – Access Control Systems
004.83 – Disk encryption
004.79 – Cyberterrorism
004.75 – Security by design
004.58 – Cryptosystem
004.55 – Certified Information Systems Security Professional
004.31 – Physical security
004.31 – CIPM
004.27 – CCNP Security
004.13 – Access control
004.09 – CISSP
004.01 – NIST
003.91 – National Cyber Security Division
003.82 – Forensics
003.82 – EC-Council Certified Security Analyst
003.81 – Computer security
003.67 – Internet security
003.66 – Antivirus software
003.56 – Open security
003.49 – Credentialing
003.45 – Encryption
002.95 – Kill chain
002.24 – Cybercrime
002.22 – OWASP
002.11 – Phishing
002.04 – Keylogger
001.75 – Denial of service
001.70 – Biometric
001.48 – National Security Agency
001.34 – Security engineering
001.29 – Rootkit
001.24 – Automated theorem proving
001.20 – CIPP
001.19 – GAWN
001.14 – OSCE
001.14 – Keystroke logging
001.01 – GIAC
000.90 – Bulletproof hosting
000.88 – Internet Crime Complaint Center
000.84 – GSEC
000.81 – CCNA Security
000.79 – Programmable logic controller
000.79 – Data integrity
000.68 – CCFP
000.65 – Cryptography
000.64 – CAPTCHA
000.62 – Data logging
000.55 – Internet privacy
000.30 – Offensive Security Certified Professional
000.28 – Offensive Security Certified Expert
000.22 – IAPP
000.16 – OSCP
000.13 – GPPA
000.11 – Information security awareness
000.11 – Attack tree
000.10 – Trusted Computer System Evaluation Criteria
000.10 – National White Collar Crime Center
000.10 – InfraGard
000.10 – Digital object identifier
000.09 – Cipher
000.08 – Stuxnet
000.05 – ISACA
000.05 – GPEN
000.04 – Secunia
000.04 – Privacy software
000.04 – GSLC
000.03 – Secure coding
000.02 – Offensive Security
000.02 – GISF
000.02 – Cryptanalysis
000.00 – Vulnerability (computing)
000.00 – USCYBERCOM
000.00 – US-CERT
000.00 – Threat modelling
000.00 – TERENA
000.00 – Symmetric-key algorithm
000.00 – Software Defined Perimeter
000.00 – Social engineering (security)
000.00 – Social engineering (computer security)
000.00 – Separation of protection and security
000.00 – SeL4
000.00 – Security-focused operating system
000.00 – Security-evaluated operating system
000.00 – Sandbox (computer security)
000.00 – Risk cybernetics
000.00 – Quantified Self
000.00 – Public-key encryption
000.00 – Proactive cyber defence
000.00 – Principle of least privilege
000.00 – Presumed security
000.00 – PikeOS
000.00 – Physical information security
000.00 – Physical firewall
000.00 – Phone cloning
000.00 – Packet capture appliance
000.00 – OSWP
000.00 – OSWE
000.00 – OSEE
000.00 – Offensive Security Wireless Professional
000.00 – Offensive Security Web Expert
000.00 – Offensive Security Exploitation Expert
000.00 – National Cyberdefence Centre
000.00 – National Cyber Security Policy 2013
000.00 – Multi-factor authentication
000.00 – Morris worm
000.00 – Mobile secure gateway
000.00 – Mile2
000.00 – INTEGRITY-178B
000.00 – Information Systems Security Management Professional
000.00 – Information Systems Security Architecture Professional
000.00 – Identity-based security
000.00 – Honeypot (computing)
000.00 – HealthCare Information Security and Privacy Practitioner
000.00 – HCISSP
000.00 – GXPN
000.00 – GWAPT
000.00 – GSSP-NET
000.00 – GSSP-JAVA
000.00 – GSNA
000.00 – GREM
000.00 – Gordon-Loeb Model
000.00 – GLEG
000.00 – GIAC Systems and Network Auditor
000.00 – GIAC Security Leadership
000.00 – GIAC Security Expert
000.00 – GIAC Security Essentials Certification
000.00 – GIAC Secure Software Programmer – Java
000.00 – GIAC Reverse Engineering Malware
000.00 – GIAC Law of Data Security and Investigations
000.00 – GIAC Information Security Professional
000.00 – GIAC Information Security Fundamentals
000.00 – GIAC Exploit Researcher and Advanced Penetration Tester
000.00 – GIAC Certified Windows Security Administrator
000.00 – GIAC Certified Web Application Penetration Tester
000.00 – GIAC Certified Unix Security Administrator
000.00 – GIAC Certified Project Manager
000.00 – GIAC Certified Perimeter Protection Analyst
000.00 – GIAC Certified Penetration Tester
000.00 – GIAC Certified Intrusion Analyst
000.00 – GIAC Certified Incident Handler
000.00 – GIAC Certified Forensics Examiner
000.00 – GIAC Certified Forensic Analyst
000.00 – GIAC Certified Enterprise Defender
000.00 – GIAC Assessing Wireless Networks
000.00 – GCWN
000.00 – GCUX
000.00 – GCPM
000.00 – GCIH
000.00 – GCIA
000.00 – GCFE
000.00 – GCED
000.00 – Full disclosure (computer security)
000.00 – Firewall (networking)
000.00 – Firewall (computing)
000.00 – Fast flux
000.00 – Fail-safe
000.00 – Exploit (computer security)
000.00 – EWPT
000.00 – Evaluation Assurance Level
000.00 – European Information Technologies Certification Institute
000.00 – European Information Technologies Certification Academy
000.00 – Error-tolerant design
000.00 – ENDP
000.00 – EMAPT
000.00 – ELearnSecurity Web Application Penetration Tester
000.00 – ELearnSecurity Network Defense Professional
000.00 – ELearnSecurity Mobile Application Penetration Tester
000.00 – ELearnSecurity Certified Reverse Engineer
000.00 – ELearnSecurity Certified Professional Penetration Tester
000.00 – ELearnSecurity Certified Junior Penetration Tester
000.00 – EJPT
000.00 – EDRP
000.00 – ECVP
000.00 – ECRE
000.00 – ECPPT Gold
000.00 – ECIH
000.00 – ECES
000.00 – ECCSP
000.00 – EC-Council Certified VoIP Professional
000.00 – EC-Council Certified Incident Handler
000.00 – EC-Council Certified Encryption Specialist
000.00 – Differentiated security
000.00 – Denial-of-service attack
000.00 – Defense in depth (computing)
000.00 – Data-centric security
000.00 – Cyberwarfare
000.00 – Cyber-security regulation
000.00 – Cyber-Insurance
000.00 – Cyber-attack
000.00 – Cyber security standards
000.00 – Cyber hygiene
000.00 – CSSLP
000.00 – Cryptographic protocol
000.00 – CPTE Certified Penetration Testing Engineer
000.00 – Computer Emergency Readiness Team
000.00 – Code injection
000.00 – Clickjacking
000.00 – Cisco Certified Network Professional – Security
000.00 – Cisco Certified Network Professional – CyberOps
000.00 – Cisco Certified Network Associate – Security
000.00 – Cisco Certified Internetwork Expert – Security
000.00 – CIPT
000.00 – CHPSE
000.00 – Chain of trust
000.00 – CertiVox
000.00 – Certified Secure Software Lifecycle Professional
000.00 – Certified Penetration Testing Engineer
000.00 – Certified Network Defense Architect
000.00 – Certified Information Systems Auditor
000.00 – Certified Information Privacy Technologist
000.00 – Certified Information Privacy Professional
000.00 – Certified Information Privacy Manager
000.00 – Certified in Risk and Information Systems Control
000.00 – Certified HIPAA Security Expert
000.00 – Certified HIPAA Privacy Security Expert
000.00 – Certified Cyber Forensics Professional
000.00 – Certified Cloud Security Professional
000.00 – Certified Chief Information Security Officer
000.00 – Certified Authorization Professional
000.00 – CCNA CyberOps
000.00 – CCISO
000.00 – Capability-based security
000.00 – Canadian Cyber Incident Response Centre
000.00 – Backdoor (computing)
000.00 – Attack (computing)
000.00 – Ashley Madison data breach
000.00 – Apache Hadoop
000.00 – Anti-virus software
000.00 – Anonymous (group)

Active Advertisers

066 – Access Control Systems
063 – Network security
057 – Access control
054 – Cyber security standards
050 – Identity management
048 – Data security
047 – Computer security
046 – Penetration test
045 – Internet security
045 – Information security
044 – Cloud computing security
043 – Two-factor authentication
042 – Information security awareness
042 – Endpoint security
041 – Application security
040 – Multi-factor authentication
040 – Intrusion detection system
038 – Licensed Penetration Tester
037 – Mobile security
037 – Certified Information Systems Security Professional
036 – Identity theft
034 – Two factor authentication
033 – Security breach
033 – National Cyber Security Division
033 – Intrusion prevention system
033 – Data loss prevention software
032 – Certified Cyber Forensics Professional
032 – Advanced persistent threat
031 – Programmable logic controller
031 – Data breach
029 – Antivirus software
028 – EC-Council Network Security Administrator
028 – EC-Council Disaster Recovery Professional
026 – Data logging
026 – Certified Information Security Manager
025 – Insider threat
021 – Application software
018 – Certified Hacking Forensic Investigator
018 – CCNA Security
017 – Digital certificate
017 – Bulletproof hosting
015 – Packet capture appliance
015 – Information Systems Security Engineering Professional
013 – Disk encryption
013 – Data-centric security
013 – Cybercrime
013 – Certified Ethical Hacker
012 – Keystroke logging
012 – Keylogger
012 – Distributed denial of service
011 – Credentialing
011 – Code review
010 – CIPP
009 – Systems Security Certified Practitioner
009 – Privacy software
009 – Apache Hadoop
009 – Anti-virus software
008 – Physical security
008 – Denial of service
008 – CCIE Security
007 – EC-Council Certified Security Analyst
007 – CISSP
007 – Canadian Cyber Incident Response Centre
005 – Internet privacy
005 – Data integrity
005 – CCNP Security
004 – Security engineering
004 – Phishing
004 – Encryption
004 – EC-Council Certified Secure Programmer
003 – OWASP
003 – Kill chain
003 – Biometric
002 – Trusted Platform Module
002 – Software Defined Perimeter
002 – NIST
002 – ISACA
002 – Forensics
002 – Content security
002 – CIPM
002 – Botnet
001 – Spoofing attack
001 – Security by design
001 – Secure coding
001 – Quantified Self
001 – Open security
001 – Offensive Security Certified Professional
001 – National White Collar Crime Center
001 – National Security Agency
001 – Internet Crime Complaint Center
001 – IAPP
001 – GPEN
001 – GIAC
001 – CCFP
001 – Attack tree
001 – Advanced Encryption Standard
001 – Access control list
000 – Vulnerability (computing)
000 – USCYBERCOM
000 – US-CERT
000 – Trusted Computer System Evaluation Criteria
000 – Threat modelling
000 – TERENA
000 – Symmetric-key algorithm
000 – Stuxnet
000 – Social engineering (security)
000 – Social engineering (computer security)
000 – Separation of protection and security
000 – SeL4
000 – Security-focused operating system
000 – Security-evaluated operating system
000 – Secure by design
000 – Secunia
000 – Sandbox (computer security)
000 – Rootkit
000 – Risk cybernetics
000 – Public-key encryption
000 – Proactive cyber defence
000 – Privilege escalation
000 – Principle of least privilege
000 – Presumed security
000 – PikeOS
000 – Physical information security
000 – Physical firewall
000 – Phone cloning
000 – OSWP
000 – OSWE
000 – OSEE
000 – OSCP
000 – OSCE
000 – Offensive Security Wireless Professional
000 – Offensive Security Web Expert
000 – Offensive Security Exploitation Expert
000 – Offensive Security Certified Expert
000 – Offensive Security
000 – National Cyberdefence Centre
000 – National Cyber Security Policy 2013
000 – Morris worm
000 – Mobile secure gateway
000 – Mile2
000 – INTEGRITY-178B
000 – InfraGard
000 – Information Systems Security Management Professional
000 – Information Systems Security Architecture Professional
000 – Identity-based security
000 – Honeypot (computing)
000 – HealthCare Information Security and Privacy Practitioner
000 – HCISSP
000 – GXPN
000 – GWAPT
000 – GSSP-NET
000 – GSSP-JAVA
000 – GSNA
000 – GSLC
000 – GSEC
000 – GREM
000 – GPPA
000 – Gordon-Loeb Model
000 – GLEG
000 – GISP
000 – GISF
000 – GIAC Systems and Network Auditor
000 – GIAC Security Leadership
000 – GIAC Security Expert
000 – GIAC Security Essentials Certification
000 – GIAC Secure Software Programmer – Java
000 – GIAC Reverse Engineering Malware
000 – GIAC Law of Data Security and Investigations
000 – GIAC Information Security Professional
000 – GIAC Information Security Fundamentals
000 – GIAC Exploit Researcher and Advanced Penetration Tester
000 – GIAC Certified Windows Security Administrator
000 – GIAC Certified Web Application Penetration Tester
000 – GIAC Certified Unix Security Administrator
000 – GIAC Certified Project Manager
000 – GIAC Certified Perimeter Protection Analyst
000 – GIAC Certified Penetration Tester
000 – GIAC Certified Intrusion Analyst
000 – GIAC Certified Incident Handler
000 – GIAC Certified Forensics Examiner
000 – GIAC Certified Forensic Analyst
000 – GIAC Certified Enterprise Defender
000 – GIAC Assessing Wireless Networks
000 – GCWN
000 – GCUX
000 – GCPM
000 – GCIH
000 – GCIA
000 – GCFE
000 – GCFA
000 – GCED
000 – GAWN
000 – Full disclosure (computer security)
000 – Firewall (networking)
000 – Firewall (computing)
000 – Fast flux
000 – Fail-safe
000 – Exploit (computer security)
000 – EWPT
000 – Evaluation Assurance Level
000 – European Information Technologies Certification Institute
000 – European Information Technologies Certification Academy
000 – Error-tolerant design
000 – ENDP
000 – EMAPT
000 – ELearnSecurity Web Application Penetration Tester
000 – ELearnSecurity Network Defense Professional
000 – ELearnSecurity Mobile Application Penetration Tester
000 – ELearnSecurity Certified Reverse Engineer
000 – ELearnSecurity Certified Professional Penetration Tester
000 – ELearnSecurity Certified Junior Penetration Tester
000 – EJPT
000 – EDRP
000 – ECVP
000 – ECRE
000 – ECPPT Gold
000 – ECIH
000 – ECES
000 – ECCSP
000 – EC-Council Certified VoIP Professional
000 – EC-Council Certified Incident Handler
000 – EC-Council Certified Encryption Specialist
000 – Digital object identifier
000 – Differentiated security
000 – Denial-of-service attack
000 – Defense in depth (computing)
000 – Cyberwarfare
000 – Cyberterrorism
000 – Cyber-security regulation
000 – Cyber-Insurance
000 – Cyber-attack
000 – Cyber hygiene
000 – CSSLP
000 – Cryptosystem
000 – Cryptography
000 – Cryptographic protocol
000 – Cryptanalysis
000 – CPTE Certified Penetration Testing Engineer
000 – Computer Fraud and Abuse Act
000 – Computer emergency response team
000 – Computer Emergency Readiness Team
000 – Common Vulnerabilities and Exposures
000 – Code injection
000 – Clickjacking
000 – Cisco Certified Network Professional – Security
000 – Cisco Certified Network Professional – CyberOps
000 – Cisco Certified Network Associate – Security
000 – Cisco Certified Internetwork Expert – Security
000 – CIPT
000 – Cipher
000 – CHPSE
000 – Chain of trust
000 – CertiVox
000 – Certified Secure Software Lifecycle Professional
000 – Certified Penetration Testing Engineer
000 – Certified Network Defense Architect
000 – Certified Information Systems Auditor
000 – Certified Information Privacy Technologist
000 – Certified Information Privacy Professional
000 – Certified Information Privacy Manager
000 – Certified in Risk and Information Systems Control
000 – Certified HIPAA Security Expert
000 – Certified HIPAA Privacy Security Expert
000 – Certified Cloud Security Professional
000 – Certified Chief Information Security Officer
000 – Certified Authorization Professional
000 – CERT Coordination Center
000 – CCNA CyberOps
000 – CCISO
000 – CAPTCHA
000 – Capability-based security
000 – Backdoor (computing)
000 – Automated theorem proving
000 – Attack (computing)
000 – Ashley Madison data breach
000 – Anonymous (group)

Patents:

11100000 – Access control
10400000 – Encryption
00169000 – Application software
00156000 – Biometric
00088100 – Fail-safe
00081400 – Cryptography
00073700 – Network security
00072800 – Programmable logic controller
00072500 – Data integrity
00067500 – Data security
00056200 – Cipher
00047000 – Information security
00038200 – NIST
00038200 – National Cyber Security Division
00037600 – Denial of service
00036600 – Public-key encryption
00032600 – Digital certificate
00030900 – Access Control Systems
00030000 – Computer security
00027000 – Data logging
00021800 – Access control list
00021200 – Advanced Encryption Standard
00020500 – Intrusion detection system
00016300 – Cryptosystem
00015500 – Forensics
00015200 – Physical security
00014200 – Identity management
00013300 – Internet security
00012800 – Identity theft
00012600 – Application security
00012400 – Security breach
00012000 – Phishing
00009940 – Denial-of-service attack
00009130 – Trusted Platform Module
00008870 – National Security Agency
00008580 – Penetration test
00006590 – Anti-virus software
00006450 – Content security
00006350 – Cyberwarfare
00006350 – Credentialing
00006020 – Vulnerability (computing)
00006020 – Two-factor authentication
00005990 – Two factor authentication
00005970 – Distributed denial of service
00005800 – Multi-factor authentication
00005220 – Mobile security
00005090 – Chain of trust
00004690 – Antivirus software
00004240 – Cryptanalysis
00003980 – Cryptographic protocol
00003930 – Intrusion prevention system
00003910 – Digital object identifier
00003650 – CAPTCHA
00003540 – Symmetric-key algorithm
00003180 – IAPP
00002420 – Rootkit
00002380 – Packet capture appliance
00002380 – Open security
00002160 – Botnet
00002090 – Code injection
00002070 – Disk encryption
00001710 – Social engineering (computer security)
00001710 – Separation of protection and security
00001710 – Security engineering
00001680 – Error-tolerant design
00001680 – Endpoint security
00001430 – ECES
00001110 – Cyber-attack
00001100 – Identity-based security
00001080 – SeL4
00001050 – Code review
00001040 – Cloud computing security
00000892 – CIPP
00000866 – Spoofing attack
00000863 – ENDP
00000850 – Internet privacy
00000818 – Apache Hadoop
00000788 – Keylogger
00000788 – GREM
00000684 – Privilege escalation
00000624 – Insider threat
00000612 – Fast flux
00000604 – Security by design
00000568 – Keystroke logging
00000555 – GIAC
00000552 – OSCP
00000511 – Secure by design
00000501 – ECRE
00000490 – Data breach
00000488 – Secure coding
00000442 – Anonymous (group)
00000428 – Cybercrime
00000417 – Principle of least privilege
00000361 – Trusted Computer System Evaluation Criteria
00000327 – Common Vulnerabilities and Exposures
00000324 – GSEC
00000298 – CIPT
00000295 – Advanced persistent threat
00000284 – Capability-based security
00000276 – OWASP
00000235 – Information security awareness
00000225 – CERT Coordination Center
00000216 – Physical firewall
00000208 – OSEE
00000197 – Physical information security
00000176 – Exploit (computer security)
00000176 – Evaluation Assurance Level
00000170 – USCYBERCOM
00000170 – US-CERT
00000168 – OSCE
00000168 – Computer emergency response team
00000157 – GPEN
00000154 – Stuxnet
00000148 – Threat modelling
00000148 – TERENA
00000141 – CCFP
00000131 – Attack tree
00000119 – Quantified Self
00000118 – GPPA
00000117 – Differentiated security
00000108 – Cyber security standards
00000108 – Clickjacking
00000099 – Privacy software
00000097 – GISP
00000081 – Firewall (computing)
00000080 – CertiVox
00000078 – CIPM
00000076 – Data-centric security
00000074 – ISACA
00000071 – Secunia
00000071 – Automated theorem proving
00000065 – Computer Emergency Readiness Team
00000056 – GSNA
00000054 – CISSP
00000051 – GCIA
00000050 – GCIH
00000050 – GCFE
00000050 – EJPT
00000050 – EDRP
00000049 – Kill chain
00000048 – GCUX
00000048 – GCPM
00000046 – GAWN
00000043 – Offensive Security
00000043 – GLEG
00000042 – Attack (computing)
00000041 – Data loss prevention software
00000036 – Morris worm
00000035 – OSWE
00000032 – GCED
00000031 – Phone cloning
00000030 – GIAC Security Essentials Certification
00000027 – ECVP
00000026 – GISF
00000026 – Cyberterrorism
00000025 – ECIH
00000024 – Honeypot (computing)
00000023 – Presumed security
00000022 – Internet Crime Complaint Center
00000022 – GSLC
00000020 – Firewall (networking)
00000019 – INTEGRITY-178B
00000019 – Cyber-Insurance
00000018 – InfraGard
00000017 – PikeOS
00000016 – National White Collar Crime Center
00000015 – Social engineering (security)
00000015 – GCFA
00000012 – Sandbox (computer security)
00000008 – Computer Fraud and Abuse Act
00000004 – GCWN
00000004 – EWPT
00000004 – EMAPT
00000003 – OSWP
00000001 – Mile2
00000001 – GXPN
00000001 – GIAC Certified Intrusion Analyst
00000001 – GIAC Certified Incident Handler
00000000 – Systems Security Certified Practitioner
00000000 – Software Defined Perimeter
00000000 – Security-focused operating system
00000000 – Security-evaluated operating system
00000000 – Risk cybernetics
00000000 – Proactive cyber defence
00000000 – Offensive Security Wireless Professional
00000000 – Offensive Security Web Expert
00000000 – Offensive Security Exploitation Expert
00000000 – Offensive Security Certified Professional
00000000 – Offensive Security Certified Expert
00000000 – National Cyberdefence Centre
00000000 – National Cyber Security Policy 2013
00000000 – Mobile secure gateway
00000000 – Licensed Penetration Tester
00000000 – Information Systems Security Management Professional
00000000 – Information Systems Security Engineering Professional
00000000 – Information Systems Security Architecture Professional
00000000 – HealthCare Information Security and Privacy Practitioner
00000000 – HCISSP
00000000 – GWAPT
00000000 – GSSP-NET
00000000 – GSSP-JAVA
00000000 – Gordon-Loeb Model
00000000 – GIAC Systems and Network Auditor
00000000 – GIAC Security Leadership
00000000 – GIAC Security Expert
00000000 – GIAC Secure Software Programmer – Java
00000000 – GIAC Reverse Engineering Malware
00000000 – GIAC Law of Data Security and Investigations
00000000 – GIAC Information Security Professional
00000000 – GIAC Information Security Fundamentals
00000000 – GIAC Exploit Researcher and Advanced Penetration Tester
00000000 – GIAC Certified Windows Security Administrator
00000000 – GIAC Certified Web Application Penetration Tester
00000000 – GIAC Certified Unix Security Administrator
00000000 – GIAC Certified Project Manager
00000000 – GIAC Certified Perimeter Protection Analyst
00000000 – GIAC Certified Penetration Tester
00000000 – GIAC Certified Forensics Examiner
00000000 – GIAC Certified Forensic Analyst
00000000 – GIAC Certified Enterprise Defender
00000000 – GIAC Assessing Wireless Networks
00000000 – Full disclosure (computer security)
00000000 – European Information Technologies Certification Institute
00000000 – European Information Technologies Certification Academy
00000000 – ELearnSecurity Web Application Penetration Tester
00000000 – ELearnSecurity Network Defense Professional
00000000 – ELearnSecurity Mobile Application Penetration Tester
00000000 – ELearnSecurity Certified Reverse Engineer
00000000 – ELearnSecurity Certified Professional Penetration Tester
00000000 – ELearnSecurity Certified Junior Penetration Tester
00000000 – ECPPT Gold
00000000 – ECCSP
00000000 – EC-Council Network Security Administrator
00000000 – EC-Council Disaster Recovery Professional
00000000 – EC-Council Certified VoIP Professional
00000000 – EC-Council Certified Security Analyst
00000000 – EC-Council Certified Secure Programmer
00000000 – EC-Council Certified Incident Handler
00000000 – EC-Council Certified Encryption Specialist
00000000 – Defense in depth (computing)
00000000 – Cyber-security regulation
00000000 – Cyber hygiene
00000000 – CSSLP
00000000 – CPTE Certified Penetration Testing Engineer
00000000 – Cisco Certified Network Professional – Security
00000000 – Cisco Certified Network Professional – CyberOps
00000000 – Cisco Certified Network Associate – Security
00000000 – Cisco Certified Internetwork Expert – Security
00000000 – CHPSE
00000000 – Certified Secure Software Lifecycle Professional
00000000 – Certified Penetration Testing Engineer
00000000 – Certified Network Defense Architect
00000000 – Certified Information Systems Security Professional
00000000 – Certified Information Systems Auditor
00000000 – Certified Information Security Manager
00000000 – Certified Information Privacy Technologist
00000000 – Certified Information Privacy Professional
00000000 – Certified Information Privacy Manager
00000000 – Certified in Risk and Information Systems Control
00000000 – Certified HIPAA Security Expert
00000000 – Certified HIPAA Privacy Security Expert
00000000 – Certified Hacking Forensic Investigator
00000000 – Certified Ethical Hacker
00000000 – Certified Cyber Forensics Professional
00000000 – Certified Cloud Security Professional
00000000 – Certified Chief Information Security Officer
00000000 – Certified Authorization Professional
00000000 – CCNP Security
00000000 – CCNA Security
00000000 – CCNA CyberOps
00000000 – CCISO
00000000 – CCIE Security
00000000 – Canadian Cyber Incident Response Centre
00000000 – Bulletproof hosting
00000000 – Backdoor (computing)
00000000 – Ashley Madison data breach

Books in print:

00024844 – Forensics
00017932 – Access control
00014852 – Computer security
00011164 – National Security Agency
00010812 – Application software
00009975 – Information security
00009627 – Encryption
00009544 – Network security
00008123 – Identity theft
00005750 – Data security
00005673 – Cryptography
00004773 – Denial of service
00004396 – Physical security
00004354 – Denial-of-service attack
00004340 – Cipher
00003624 – Fail-safe
00003605 – Access control list
00003491 – Mile2
00003293 – Intrusion detection system
00002913 – Cyber-attack
00002841 – Biometric
00002717 – Anti-virus software
00002693 – Security breach
00002663 – NIST
00002631 – Data integrity
00002576 – Internet security
00002378 – Digital certificate
00002313 – Public-key encryption
00002271 – Advanced Encryption Standard
00002188 – Programmable logic controller
00002138 – Computer emergency response team
00002064 – Antivirus software
00002018 – Distributed denial of service
00002006 – Identity management
00001949 – OSCE
00001715 – ECES
00001702 – Access Control Systems
00001391 – Two-factor authentication
00001391 – Two factor authentication
00001359 – Penetration test
00001247 – Application security
00001229 – Computer Fraud and Abuse Act
00001211 – Cybercrime
00001179 – Phishing
00001150 – Security engineering
00001134 – Code review
00000986 – Data breach
00000947 – Cryptosystem
00000922 – Intrusion prevention system
00000852 – Trusted Platform Module
00000841 – Computer Emergency Readiness Team
00000815 – CISSP
00000774 – Principle of least privilege
00000765 – Digital object identifier
00000758 – Cryptographic protocol
00000738 – Insider threat
00000735 – Cryptanalysis
00000698 – Certified Information Systems Security Professional
00000697 – Security by design
00000669 – Automated theorem proving
00000666 – National White Collar Crime Center
00000657 – Internet Crime Complaint Center
00000613 – Data logging
00000583 – Botnet
00000560 – Apache Hadoop
00000537 – Trusted Computer System Evaluation Criteria
00000502 – US-CERT
00000480 – Advanced persistent threat
00000453 – Multi-factor authentication
00000444 – Disk encryption
00000438 – Rootkit
00000420 – Mobile security
00000411 – Cyberterrorism
00000406 – Internet privacy
00000388 – Common Vulnerabilities and Exposures
00000383 – CERT Coordination Center
00000379 – ISACA
00000334 – CAPTCHA
00000331 – Privilege escalation
00000329 – Symmetric-key algorithm
00000313 – Certified Ethical Hacker
00000312 – Stuxnet
00000301 – Cloud computing security
00000277 – GREM
00000275 – Quantified Self
00000270 – Certified Information Security Manager
00000269 – Anonymous (group)
00000268 – Attack tree
00000266 – National Cyber Security Division
00000260 – Spoofing attack
00000240 – Secure coding
00000219 – Evaluation Assurance Level
00000207 – CCNA Security
00000179 – Code injection
00000177 – OWASP
00000173 – Cyberwarfare
00000159 – Content security
00000159 – Chain of trust
00000158 – Kill chain
00000154 – Keylogger
00000151 – OSEE
00000147 – Keystroke logging
00000143 – SeL4
00000134 – Systems Security Certified Practitioner
00000134 – CIPP
00000132 – Information security awareness
00000130 – Fast flux
00000130 – Endpoint security
00000121 – IAPP
00000119 – Open security
00000119 – Morris worm
00000111 – ENDP
00000108 – Secure by design
00000107 – TERENA
00000098 – Offensive Security
00000084 – CCNP Security
00000082 – Cyber-Insurance
00000082 – CIPM
00000080 – GISP
00000077 – Physical information security
00000072 – Certified in Risk and Information Systems Control
00000070 – Cyber security standards
00000068 – CCIE Security
00000066 – GAWN
00000064 – Privacy software
00000062 – CCFP
00000061 – Information Systems Security Architecture Professional
00000060 – GIAC Certified Forensic Analyst
00000056 – GIAC Certified Incident Handler
00000051 – Information Systems Security Management Professional
00000051 – GSEC
00000051 – GIAC Security Essentials Certification
00000049 – InfraGard
00000047 – EC-Council Certified Security Analyst
00000046 – USCYBERCOM
00000044 – Clickjacking
00000043 – Certified Information Privacy Professional
00000042 – Firewall (networking)
00000039 – Licensed Penetration Tester
00000038 – CIPT
00000037 – Social engineering (security)
00000036 – ECRE
00000035 – OSCP
00000034 – Firewall (computing)
00000034 – Cisco Certified Network Associate – Security
00000033 – EDRP
00000032 – Information Systems Security Engineering Professional
00000031 – CSSLP
00000030 – Certified Cyber Forensics Professional
00000029 – Data loss prevention software
00000027 – GCFA
00000026 – EC-Council Network Security Administrator
00000026 – EC-Council Disaster Recovery Professional
00000026 – Certified Authorization Professional
00000022 – Threat modelling
00000022 – Offensive Security Certified Professional
00000021 – Canadian Cyber Incident Response Centre
00000020 – Sandbox (computer security)
00000020 – Exploit (computer security)
00000020 – Cyber hygiene
00000019 – Cyber-security regulation
00000019 – Certified Hacking Forensic Investigator
00000019 – Capability-based security
00000017 – Data-centric security
00000016 – Security-focused operating system
00000016 – HealthCare Information Security and Privacy Practitioner
00000016 – GIAC Reverse Engineering Malware
00000015 – Secunia
00000014 – National Cyber Security Policy 2013
00000014 – GIAC Certified Windows Security Administrator
00000013 – Proactive cyber defence
00000013 – GIAC Information Security Fundamentals
00000013 – GIAC Certified Penetration Tester
00000013 – GCIA
00000012 – Physical firewall
00000012 – INTEGRITY-178B
00000012 – Identity-based security
00000012 – GSLC
00000012 – GLEG
00000011 – Attack (computing)
00000010 – Social engineering (computer security)
00000010 – Phone cloning
00000010 – GPEN
00000010 – GIAC Certified Project Manager
00000010 – EC-Council Certified Secure Programmer
00000010 – Certified Cloud Security Professional
00000010 – Bulletproof hosting
00000010 – Backdoor (computing)
00000009 – Software Defined Perimeter
00000009 – PikeOS
00000009 – GIAC Information Security Professional
00000009 – GIAC Certified Unix Security Administrator
00000009 – GCPM
00000008 – GIAC Security Leadership
00000008 – GIAC Certified Forensics Examiner
00000008 – GIAC Certified Enterprise Defender
00000008 – GIAC Assessing Wireless Networks
00000008 – GCIH
00000008 – EC-Council Certified VoIP Professional
00000008 – Certified Chief Information Security Officer
00000007 – Security-evaluated operating system
00000007 – Gordon-Loeb Model
00000007 – GIAC Security Expert
00000006 – GSNA
00000006 – GPPA
00000006 – GIAC Secure Software Programmer – Java
00000006 – ELearnSecurity Certified Professional Penetration Tester
00000006 – Cisco Certified Network Professional – Security
00000005 – Offensive Security Certified Expert
00000005 – Honeypot (computing)
00000005 – GISF
00000005 – Error-tolerant design
00000005 – CertiVox
00000005 – Ashley Madison data breach
00000004 – Packet capture appliance
00000004 – OSWE
00000004 – Offensive Security Wireless Professional
00000004 – Full disclosure (computer security)
00000004 – ECIH
00000004 – Defense in depth (computing)
00000004 – CHPSE
00000003 – Presumed security
00000003 – GSSP-JAVA
00000003 – GCWN
00000003 – Cisco Certified Internetwork Expert – Security
00000002 – OSWP
00000002 – GIAC Certified Perimeter Protection Analyst
00000002 – EWPT
00000000 – Vulnerability (computing)
00000000 – Separation of protection and security
00000000 – Risk cybernetics
00000000 – Offensive Security Web Expert
00000000 – Offensive Security Exploitation Expert
00000000 – National Cyberdefence Centre
00000000 – Mobile secure gateway
00000000 – HCISSP
00000000 – GXPN
00000000 – GWAPT
00000000 – GSSP-NET
00000000 – GIAC Systems and Network Auditor
00000000 – GIAC Law of Data Security and Investigations
00000000 – GIAC Exploit Researcher and Advanced Penetration Tester
00000000 – GIAC Certified Web Application Penetration Tester
00000000 – GIAC Certified Intrusion Analyst
00000000 – GIAC
00000000 – GCUX
00000000 – GCFE
00000000 – GCED
00000000 – European Information Technologies Certification Institute
00000000 – European Information Technologies Certification Academy
00000000 – EMAPT
00000000 – ELearnSecurity Web Application Penetration Tester
00000000 – ELearnSecurity Network Defense Professional
00000000 – ELearnSecurity Mobile Application Penetration Tester
00000000 – ELearnSecurity Certified Reverse Engineer
00000000 – ELearnSecurity Certified Junior Penetration Tester
00000000 – EJPT
00000000 – ECVP
00000000 – ECPPT Gold
00000000 – ECCSP
00000000 – EC-Council Certified Incident Handler
00000000 – EC-Council Certified Encryption Specialist
00000000 – Differentiated security
00000000 – Credentialing
00000000 – CPTE Certified Penetration Testing Engineer
00000000 – Cisco Certified Network Professional – CyberOps
00000000 – Certified Secure Software Lifecycle Professional
00000000 – Certified Penetration Testing Engineer
00000000 – Certified Network Defense Architect
00000000 – Certified Information Systems Auditor
00000000 – Certified Information Privacy Technologist
00000000 – Certified Information Privacy Manager
00000000 – Certified HIPAA Security Expert
00000000 – Certified HIPAA Privacy Security Expert
00000000 – CCNA CyberOps
00000000 – CCISO

Youtube content:

00706000 – Cipher
00665000 – EMAPT
00433000 – CIPT
00354000 – GIAC
00266000 – Encryption
00220000 – Identity theft
00211000 – Forensics
00176000 – OSCE
00161000 – Internet security
00159000 – Rootkit
00151000 – Keylogger
00144000 – NIST
00144000 – Access control
00143000 – Phishing
00132000 – Biometric
00126000 – Network security
00123000 – Information security
00122000 – Kill chain
00114000 – CAPTCHA
00089400 – Penetration test
00083600 – Botnet
00074500 – Fail-safe
00074400 – GREM
00071900 – Cyber-attack
00067000 – Cryptography
00065400 – Cybercrime
00063500 – TERENA
00061500 – Computer security
00055600 – Mobile security
00053900 – Data security
00053400 – Security breach
00050900 – Denial of service
00050400 – Code review
00037700 – Data breach
00036600 – Internet privacy
00034200 – Antivirus software
00030400 – Apache Hadoop
00029900 – Stuxnet
00029300 – Data logging
00026700 – Anti-virus software
00026000 – OWASP
00025100 – Application security
00024500 – National Security Agency
00020900 – GAWN
00019800 – Identity management
00019100 – Application software
00018600 – Access Control Systems
00017500 – HCISSP
00017500 – CISSP
00017000 – CCNA Security
00016500 – Information security awareness
00016000 – CIPP
00014500 – Two-factor authentication
00014500 – Two factor authentication
00014500 – Physical security
00014000 – Programmable logic controller
00013800 – Code injection
00012600 – Endpoint security
00011800 – CIPM
00010800 – GCED
00009110 – Certified Ethical Hacker
00008960 – IAPP
00008660 – Intrusion detection system
00008630 – Quantified Self
00008010 – Credentialing
00007880 – ISACA
00007540 – Privilege escalation
00007270 – Data integrity
00007250 – ECIH
00007240 – GPEN
00007110 – Denial-of-service attack
00006790 – GSLC
00006660 – Disk encryption
00006430 – Cyberwarfare
00006350 – Access control list
00006200 – Anonymous (group)
00005960 – Cloud computing security
00005740 – OSEE
00005670 – ECES
00005650 – CCIE Security
00005340 – Multi-factor authentication
00005180 – CCNP Security
00005100 – Public-key encryption
00004910 – Insider threat
00004890 – Clickjacking
00004800 – Cryptanalysis
00004630 – Open security
00004620 – Offensive Security
00003970 – GCIA
00003900 – GCFA
00003810 – InfraGard
00003660 – Distributed denial of service
00003630 – Intrusion prevention system
00003590 – GISP
00003580 – GSEC
00003560 – Cryptosystem
00003530 – Digital certificate
00003200 – Secure coding
00003190 – Advanced Encryption Standard
00003150 – Cyberterrorism
00002840 – ECRE
00002830 – EDRP
00002780 – Security engineering
00002510 – CCFP
00002170 – Firewall (networking)
00002150 – Content security
00002070 – Spoofing attack
00002070 – Cyber-Insurance
00002050 – Secunia
00002000 – Mile2
00001880 – Advanced persistent threat
00001850 – GLEG
00001750 – Attack tree
00001450 – GCPM
00001420 – Certified Information Systems Auditor
00001390 – Certified Information Systems Security Professional
00001290 – SeL4
00001250 – GSNA
00001230 – Chain of trust
00001220 – Security by design
00001200 – Phone cloning
00001110 – GISF
00001090 – GPPA
00001090 – ENDP
00001070 – Privacy software
00001050 – Computer Fraud and Abuse Act
00001030 – Trusted Platform Module
00001000 – OSCP
00000996 – Certified Information Security Manager
00000916 – Secure by design
00000913 – US-CERT
00000897 – Keystroke logging
00000875 – GCFE
00000815 – OSWP
00000690 – OSWE
00000679 – Internet Crime Complaint Center
00000669 – Data loss prevention software
00000537 – Fast flux
00000532 – ECVP
00000457 – Social engineering (security)
00000444 – GCIH
00000441 – Data-centric security
00000393 – Physical information security
00000389 – PikeOS
00000359 – Cyber hygiene
00000311 – Digital object identifier
00000307 – EC-Council Certified Security Analyst
00000300 – Cyber security standards
00000289 – National Cyber Security Division
00000282 – Morris worm
00000280 – EJPT
00000276 – Licensed Penetration Tester
00000264 – CSSLP
00000260 – Automated theorem proving
00000259 – CCISO
00000241 – USCYBERCOM
00000227 – Certified in Risk and Information Systems Control
00000223 – Ashley Madison data breach
00000220 – GXPN
00000218 – Computer emergency response team
00000214 – Certified Information Privacy Manager
00000191 – Certified Information Privacy Technologist
00000182 – Bulletproof hosting
00000178 – EWPT
00000175 – Sandbox (computer security)
00000175 – Certified Chief Information Security Officer
00000174 – Systems Security Certified Practitioner
00000153 – Threat modelling
00000153 – GCUX
00000138 – Principle of least privilege
00000138 – Cryptographic protocol
00000136 – Computer Emergency Readiness Team
00000129 – Information Systems Security Engineering Professional
00000129 – Common Vulnerabilities and Exposures
00000119 – Honeypot (computing)
00000119 – GCWN
00000119 – Certified Information Privacy Professional
00000119 – Certified Authorization Professional
00000117 – Certified Penetration Testing Engineer
00000115 – Information Systems Security Architecture Professional
00000103 – Symmetric-key algorithm
00000099 – Offensive Security Certified Professional
00000098 – Certified Cloud Security Professional
00000093 – National Cyber Security Policy 2013
00000088 – Identity-based security
00000082 – Certified Secure Software Lifecycle Professional
00000081 – Cisco Certified Internetwork Expert – Security
00000078 – GWAPT
00000074 – GIAC Certified Intrusion Analyst
00000074 – GIAC Certified Incident Handler
00000071 – CHPSE
00000067 – Proactive cyber defence
00000063 – Trusted Computer System Evaluation Criteria
00000060 – National White Collar Crime Center
00000057 – CertiVox
00000053 – EC-Council Certified Secure Programmer
00000051 – Certified HIPAA Security Expert
00000049 – Firewall (computing)
00000046 – GSSP-JAVA
00000045 – Cisco Certified Network Associate – Security
00000043 – Physical firewall
00000038 – Gordon-Loeb Model
00000038 – Backdoor (computing)
00000036 – GSSP-NET
00000035 – Capability-based security
00000034 – Exploit (computer security)
00000025 – GIAC Security Leadership
00000025 – Certified HIPAA Privacy Security Expert
00000021 – Software Defined Perimeter
00000021 – GIAC Certified Forensic Analyst
00000020 – GIAC Assessing Wireless Networks
00000016 – GIAC Security Essentials Certification
00000016 – EC-Council Disaster Recovery Professional
00000014 – GIAC Certified Project Manager
00000014 – Cyber-security regulation
00000013 – Defense in depth (computing)
00000011 – Vulnerability (computing)
00000011 – GIAC Secure Software Programmer – Java
00000011 – Cisco Certified Network Professional – Security
00000010 – Differentiated security
00000010 – Certified Cyber Forensics Professional
00000010 – CERT Coordination Center
00000008 – Presumed security
00000008 – Evaluation Assurance Level
00000008 – Attack (computing)
00000007 – EC-Council Network Security Administrator
00000006 – Information Systems Security Management Professional
00000003 – Security-evaluated operating system
00000003 – GIAC Systems and Network Auditor
00000003 – European Information Technologies Certification Academy
00000003 – Certified Hacking Forensic Investigator
00000003 – Canadian Cyber Incident Response Centre
00000002 – HealthCare Information Security and Privacy Practitioner
00000002 – GIAC Security Expert
00000002 – GIAC Reverse Engineering Malware
00000002 – GIAC Information Security Professional
00000002 – GIAC Information Security Fundamentals
00000002 – Error-tolerant design
00000002 – EC-Council Certified Incident Handler
00000002 – Certified Network Defense Architect
00000001 – Social engineering (computer security)
00000001 – Security-focused operating system
00000001 – Packet capture appliance
00000001 – Offensive Security Wireless Professional
00000001 – Mobile secure gateway
00000001 – GIAC Exploit Researcher and Advanced Penetration Tester
00000001 – GIAC Certified Web Application Penetration Tester
00000001 – GIAC Certified Enterprise Defender
00000001 – ELearnSecurity Network Defense Professional
00000001 – ECCSP
00000001 – EC-Council Certified VoIP Professional
00000001 – CPTE Certified Penetration Testing Engineer
00000001 – CCNA CyberOps
00000000 – Separation of protection and security
00000000 – Risk cybernetics
00000000 – Offensive Security Web Expert
00000000 – Offensive Security Exploitation Expert
00000000 – Offensive Security Certified Expert
00000000 – National Cyberdefence Centre
00000000 – INTEGRITY-178B
00000000 – GIAC Law of Data Security and Investigations
00000000 – GIAC Certified Windows Security Administrator
00000000 – GIAC Certified Unix Security Administrator
00000000 – GIAC Certified Perimeter Protection Analyst
00000000 – GIAC Certified Penetration Tester
00000000 – GIAC Certified Forensics Examiner
00000000 – Full disclosure (computer security)
00000000 – European Information Technologies Certification Institute
00000000 – ELearnSecurity Web Application Penetration Tester
00000000 – ELearnSecurity Mobile Application Penetration Tester
00000000 – ELearnSecurity Certified Reverse Engineer
00000000 – ELearnSecurity Certified Professional Penetration Tester
00000000 – ELearnSecurity Certified Junior Penetration Tester
00000000 – ECPPT Gold
00000000 – EC-Council Certified Encryption Specialist
00000000 – Cisco Certified Network Professional – CyberOps

Start with CCNA CyberOps, GPEN, EDRP, and make the above top Predictive Analytics results happen:

Access all the Cybersecurity Prescriptive Analytics CCNA CyberOps, GPEN, EDRP, blueprints, presentations and templates and much more in The Art of Service LAB theartofservice.co/lab. Sign up for 7 days free today.

Storage Technologies PREDICTIVE ANALYTICS REPORT

 

This Storage Technologies report evaluates technologies and applications in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

This predictive analytics evaluates 36 storage-related hardware and software technologies in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

The Predictive Analytics Scores below – ordered on Forecasted Future Needs and Demand from High to Low – shows you Storage Technologies’s Predictive Analysis. The link takes you to a corresponding product in The Art of Service’s store to get started.

The Art of Service’s predictive model results enable businesses to discover and apply the most profitable technologies and applications, attracting the most profitable customers, and therefore helping maximize value from their investments. The Predictive Analytics algorithm evaluates and scores technologies and applications.

The platform monitors over six thousand technologies and applications for months, looking for interest swings in a topic, concept, technology or application, not just a count of mentions. It then makes forecasts about the velocity of the interest over time, with peaks representing it breaking into the mainstream. Data sources include trend data, employment data, employee skills data, and signals like advertising spent, advertisers, search-counts, youtube activity, patents, and books published.

 

Predictive Analytics Scores:

000923 – Public Cloud Storage
000760 – Object Storage
000293 – Software-Defined Storage
000130 – File Analysis
000093 – Cloud Storage Gateway
000082 – Data Deduplication
000068 – Disaster Recovery as a Service
000048 – Data Sanitization
000037 – Copy Data Management
000019 – Fibre Channel Over Ethernet
000017 – Virtual Storage Appliance
000001 – Continuous Data Protection
000000 – Virtual Machine Backup and Recovery
000000 – Storage Multitenancy
000000 – Storage Cluster File Systems
000000 – Solid-State DIMMs
000000 – Solid-State Arrays
000000 – SaaS Archiving of Messaging Data
000000 – Open-Source Storage
000000 – Online Data Compression
000000 – Linear Tape File System (LTFS)
000000 – Integrated Backup Appliances
000000 – Information Dispersal Algorithms
000000 – I/O Optimization
000000 – Hybrid DIMMs
000000 – External Storage Virtualization
000000 – Enterprise Information Archiving
000000 – Enterprise File Synchronization and Sharing (EFSS)
000000 – Enterprise Endpoint Backup
000000 – Emerging Data Storage Protection Schemes
000000 – Data Encryption Technologies, HDDs and SSDs
000000 – Cross-Platform Structured Data Archiving
000000 – Cloud-Based Backup Services
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Automatic Storage Tiering
000000 – Appliance-Based Replication

Evaluation Criteria Definitions:

Interest and Popularity:

Leaders:

096 – Software-Defined Storage
095 – Object Storage
064 – Public Cloud Storage

Google Trends data for gauging mindshare and awareness, the numbers are relative to their maximum (100), meaning number 100 has maximum interest right now and number 50 has half the interest it had from its peak of 100.

Employment Demand:

Leaders:

000297 – Object Storage
000149 – File Analysis
000134 – Software-Defined Storage

Open employment opportunities on the date of this report for the subject. Indicator of the need of employers for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Active Practitioners:

Leaders:

00004928 – File Analysis
00004397 – Software-Defined Storage
00003711 – Object Storage

Number of practitioners and professionals which have the subject skill set and experience. Indicator of the need of employers (and availability of employees) for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Monthly Searches:

Leaders:

004410 – Software-Defined Storage
002910 – Object Storage
001590 – Data Deduplication

How often a month a search is performed for the keyword/phrase: and indicator of interest in the subject.

Cost per Click:

Leaders:

015.71 – Disaster Recovery as a Service
014.70 – Public Cloud Storage
013.99 – Continuous Data Protection

CPC: The average amount advertisers pay Google anytime someone clicks their own ad for this keyword. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Active Advertisers:

Leaders:

051 – Disaster Recovery as a Service
050 – Public Cloud Storage
042 – Continuous Data Protection

This shows how many unique advertisers have appeared on this subject in the last 12 months. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Patents:

Leaders:

00011900 – Storage Cluster File Systems
00011900 – Object Storage
00004530 – Continuous Data Protection

Patents issued for the specific subject. Indicator of R&D investments and innovation in the specific subject.

Books in print:

Leaders:

00000384 – Fibre Channel Over Ethernet
00000245 – Disaster Recovery as a Service
00000177 – File Analysis

Number of in-print books that cover the subject. Indicator of the need for knowledge sharing and its availability.

Youtube content:

Leaders:

00008290 – Software-Defined Storage
00005710 – Object Storage
00003850 – Disaster Recovery as a Service

Number of youtube content videos that cover the subject. Indicator of the need for knowledge sharing and its availability.

Complete Overview:

Interest and Popularity

096 – Software-Defined Storage
095 – Object Storage
064 – Public Cloud Storage
064 – Cloud Storage Gateway
054 – Data Deduplication
043 – File Analysis
034 – Disaster Recovery as a Service
029 – Virtual Storage Appliance
023 – Data Sanitization
017 – Copy Data Management
013 – Fibre Channel Over Ethernet
003 – Continuous Data Protection
000 – Virtual Machine Backup and Recovery
000 – Storage Multitenancy
000 – Storage Cluster File Systems
000 – Solid-State DIMMs
000 – Solid-State Arrays
000 – SaaS Archiving of Messaging Data
000 – Open-Source Storage
000 – Online Data Compression
000 – Linear Tape File System (LTFS)
000 – Integrated Backup Appliances
000 – Information Dispersal Algorithms
000 – I/O Optimization
000 – Hybrid DIMMs
000 – External Storage Virtualization
000 – Enterprise Information Archiving
000 – Enterprise File Synchronization and Sharing (EFSS)
000 – Enterprise Endpoint Backup
000 – Emerging Data Storage Protection Schemes
000 – Data Encryption Technologies, HDDs and SSDs
000 – Cross-Platform Structured Data Archiving
000 – Cloud-Based Backup Services
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Automatic Storage Tiering
000 – Appliance-Based Replication

Employment Demand:

000297 – Object Storage
000149 – File Analysis
000134 – Software-Defined Storage
000031 – Data Deduplication
000030 – Public Cloud Storage
000016 – Disaster Recovery as a Service
000012 – Data Sanitization
000009 – Open-Source Storage
000007 – Fibre Channel Over Ethernet
000006 – I/O Optimization
000005 – Copy Data Management
000004 – Enterprise Information Archiving
000003 – Continuous Data Protection
000003 – Appliance-Based Replication
000001 – Solid-State Arrays
000001 – Cloud-Based Backup Services
000000 – Virtual Storage Appliance
000000 – Virtual Machine Backup and Recovery
000000 – Storage Multitenancy
000000 – Storage Cluster File Systems
000000 – Solid-State DIMMs
000000 – SaaS Archiving of Messaging Data
000000 – Online Data Compression
000000 – Linear Tape File System (LTFS)
000000 – Integrated Backup Appliances
000000 – Information Dispersal Algorithms
000000 – Hybrid DIMMs
000000 – External Storage Virtualization
000000 – Enterprise File Synchronization and Sharing (EFSS)
000000 – Enterprise Endpoint Backup
000000 – Emerging Data Storage Protection Schemes
000000 – Data Encryption Technologies, HDDs and SSDs
000000 – Cross-Platform Structured Data Archiving
000000 – Cloud Storage Gateway
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Automatic Storage Tiering

Active Practitioners:

00004928 – File Analysis
00004397 – Software-Defined Storage
00003711 – Object Storage
00002047 – Data Deduplication
00001012 – Continuous Data Protection
00000804 – Disaster Recovery as a Service
00000571 – Data Sanitization
00000486 – Fibre Channel Over Ethernet
00000247 – Open-Source Storage
00000227 – Copy Data Management
00000208 – Public Cloud Storage
00000167 – Virtual Storage Appliance
00000121 – I/O Optimization
00000113 – Enterprise Information Archiving
00000069 – Cloud Storage Gateway
00000037 – Solid-State Arrays
00000031 – Linear Tape File System (LTFS)
00000019 – Enterprise File Synchronization and Sharing (EFSS)
00000019 – Cloud-Based Backup Services
00000018 – External Storage Virtualization
00000016 – Information Dispersal Algorithms
00000015 – Virtual Machine Backup and Recovery
00000013 – Enterprise Endpoint Backup
00000011 – Automatic Storage Tiering
00000008 – Online Data Compression
00000008 – Integrated Backup Appliances
00000006 – Storage Cluster File Systems
00000004 – Appliance-Based Replication
00000002 – Storage Multitenancy
00000000 – Solid-State DIMMs
00000000 – SaaS Archiving of Messaging Data
00000000 – Hybrid DIMMs
00000000 – Emerging Data Storage Protection Schemes
00000000 – Data Encryption Technologies, HDDs and SSDs
00000000 – Cross-Platform Structured Data Archiving
00000000 – Cloud Computing and the Enterprise-Defined Data Center

Monthly Searches:

004410 – Software-Defined Storage
002910 – Object Storage
001590 – Data Deduplication
000600 – Fibre Channel Over Ethernet
000600 – Continuous Data Protection
000480 – Virtual Storage Appliance
000480 – Data Sanitization
000390 – Disaster Recovery as a Service
000120 – Public Cloud Storage
000000 – Virtual Machine Backup and Recovery
000000 – Storage Multitenancy
000000 – Storage Cluster File Systems
000000 – Solid-State DIMMs
000000 – Solid-State Arrays
000000 – SaaS Archiving of Messaging Data
000000 – Open-Source Storage
000000 – Online Data Compression
000000 – Linear Tape File System (LTFS)
000000 – Integrated Backup Appliances
000000 – Information Dispersal Algorithms
000000 – I/O Optimization
000000 – Hybrid DIMMs
000000 – File Analysis
000000 – External Storage Virtualization
000000 – Enterprise Information Archiving
000000 – Enterprise File Synchronization and Sharing (EFSS)
000000 – Enterprise Endpoint Backup
000000 – Emerging Data Storage Protection Schemes
000000 – Data Encryption Technologies, HDDs and SSDs
000000 – Cross-Platform Structured Data Archiving
000000 – Copy Data Management
000000 – Cloud-Based Backup Services
000000 – Cloud Storage Gateway
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Automatic Storage Tiering
000000 – Appliance-Based Replication

Cost per Click:

015.71 – Disaster Recovery as a Service
014.70 – Public Cloud Storage
013.99 – Continuous Data Protection
009.95 – Data Deduplication
009.67 – Virtual Storage Appliance
008.07 – Software-Defined Storage
006.75 – Object Storage
004.53 – Fibre Channel Over Ethernet
002.77 – Data Sanitization
000.00 – Virtual Machine Backup and Recovery
000.00 – Storage Multitenancy
000.00 – Storage Cluster File Systems
000.00 – Solid-State DIMMs
000.00 – Solid-State Arrays
000.00 – SaaS Archiving of Messaging Data
000.00 – Open-Source Storage
000.00 – Online Data Compression
000.00 – Linear Tape File System (LTFS)
000.00 – Integrated Backup Appliances
000.00 – Information Dispersal Algorithms
000.00 – I/O Optimization
000.00 – Hybrid DIMMs
000.00 – File Analysis
000.00 – External Storage Virtualization
000.00 – Enterprise Information Archiving
000.00 – Enterprise File Synchronization and Sharing (EFSS)
000.00 – Enterprise Endpoint Backup
000.00 – Emerging Data Storage Protection Schemes
000.00 – Data Encryption Technologies, HDDs and SSDs
000.00 – Cross-Platform Structured Data Archiving
000.00 – Copy Data Management
000.00 – Cloud-Based Backup Services
000.00 – Cloud Storage Gateway
000.00 – Cloud Computing and the Enterprise-Defined Data Center
000.00 – Automatic Storage Tiering
000.00 – Appliance-Based Replication

Active Advertisers

051 – Disaster Recovery as a Service
050 – Public Cloud Storage
042 – Continuous Data Protection
033 – Virtual Storage Appliance
032 – Software-Defined Storage
024 – Cloud Storage Gateway
023 – Object Storage
014 – Data Deduplication
013 – Virtual Machine Backup and Recovery
012 – Enterprise Endpoint Backup
006 – Copy Data Management
003 – Data Sanitization
000 – Storage Multitenancy
000 – Storage Cluster File Systems
000 – Solid-State DIMMs
000 – Solid-State Arrays
000 – SaaS Archiving of Messaging Data
000 – Open-Source Storage
000 – Online Data Compression
000 – Linear Tape File System (LTFS)
000 – Integrated Backup Appliances
000 – Information Dispersal Algorithms
000 – I/O Optimization
000 – Hybrid DIMMs
000 – File Analysis
000 – Fibre Channel Over Ethernet
000 – External Storage Virtualization
000 – Enterprise Information Archiving
000 – Enterprise File Synchronization and Sharing (EFSS)
000 – Emerging Data Storage Protection Schemes
000 – Data Encryption Technologies, HDDs and SSDs
000 – Cross-Platform Structured Data Archiving
000 – Cloud-Based Backup Services
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Automatic Storage Tiering
000 – Appliance-Based Replication

Patents:

00011900 – Storage Cluster File Systems
00011900 – Object Storage
00004530 – Continuous Data Protection
00004280 – Data Deduplication
00003380 – Fibre Channel Over Ethernet
00003380 – Automatic Storage Tiering
00002760 – File Analysis
00002760 – Copy Data Management
00001270 – Virtual Storage Appliance
00001270 – Cloud-Based Backup Services
00001240 – Public Cloud Storage
00001200 – External Storage Virtualization
00000493 – Online Data Compression
00000493 – Disaster Recovery as a Service
00000226 – Solid-State Arrays
00000204 – I/O Optimization
00000152 – Data Sanitization
00000150 – Linear Tape File System (LTFS)
00000147 – Virtual Machine Backup and Recovery
00000147 – Cloud Storage Gateway
00000146 – Integrated Backup Appliances
00000146 – Information Dispersal Algorithms
00000112 – Open-Source Storage
00000086 – Software-Defined Storage
00000000 – Storage Multitenancy
00000000 – Solid-State DIMMs
00000000 – SaaS Archiving of Messaging Data
00000000 – Hybrid DIMMs
00000000 – Enterprise Information Archiving
00000000 – Enterprise File Synchronization and Sharing (EFSS)
00000000 – Enterprise Endpoint Backup
00000000 – Emerging Data Storage Protection Schemes
00000000 – Data Encryption Technologies, HDDs and SSDs
00000000 – Cross-Platform Structured Data Archiving
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Appliance-Based Replication

Books in print:

00000384 – Fibre Channel Over Ethernet
00000245 – Disaster Recovery as a Service
00000177 – File Analysis
00000102 – Data Deduplication
00000084 – Cloud-Based Backup Services
00000058 – Software-Defined Storage
00000056 – Solid-State Arrays
00000051 – Continuous Data Protection
00000032 – Public Cloud Storage
00000024 – Data Sanitization
00000011 – Virtual Storage Appliance
00000004 – Linear Tape File System (LTFS)
00000003 – Storage Cluster File Systems
00000003 – Online Data Compression
00000003 – Copy Data Management
00000003 – Automatic Storage Tiering
00000000 – Virtual Machine Backup and Recovery
00000000 – Storage Multitenancy
00000000 – Solid-State DIMMs
00000000 – SaaS Archiving of Messaging Data
00000000 – Open-Source Storage
00000000 – Object Storage
00000000 – Integrated Backup Appliances
00000000 – Information Dispersal Algorithms
00000000 – I/O Optimization
00000000 – Hybrid DIMMs
00000000 – External Storage Virtualization
00000000 – Enterprise Information Archiving
00000000 – Enterprise File Synchronization and Sharing (EFSS)
00000000 – Enterprise Endpoint Backup
00000000 – Emerging Data Storage Protection Schemes
00000000 – Data Encryption Technologies, HDDs and SSDs
00000000 – Cross-Platform Structured Data Archiving
00000000 – Cloud Storage Gateway
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Appliance-Based Replication

Youtube content:

00008290 – Software-Defined Storage
00005710 – Object Storage
00003850 – Disaster Recovery as a Service
00002440 – Data Deduplication
00001960 – File Analysis
00001230 – Public Cloud Storage
00000874 – Fibre Channel Over Ethernet
00000867 – Continuous Data Protection
00000527 – Virtual Storage Appliance
00000366 – Automatic Storage Tiering
00000302 – Open-Source Storage
00000295 – Cloud Storage Gateway
00000288 – Linear Tape File System (LTFS)
00000168 – Copy Data Management
00000110 – Virtual Machine Backup and Recovery
00000091 – Data Sanitization
00000079 – Cloud-Based Backup Services
00000054 – Enterprise Endpoint Backup
00000031 – Storage Multitenancy
00000025 – Enterprise Information Archiving
00000015 – Integrated Backup Appliances
00000005 – Enterprise File Synchronization and Sharing (EFSS)
00000004 – Solid-State Arrays
00000003 – Online Data Compression
00000002 – I/O Optimization
00000001 – External Storage Virtualization
00000000 – Storage Cluster File Systems
00000000 – Solid-State DIMMs
00000000 – SaaS Archiving of Messaging Data
00000000 – Information Dispersal Algorithms
00000000 – Hybrid DIMMs
00000000 – Emerging Data Storage Protection Schemes
00000000 – Data Encryption Technologies, HDDs and SSDs
00000000 – Cross-Platform Structured Data Archiving
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Appliance-Based Replication

Start with Public Cloud Storage, Object Storage, Software-Defined Storage, and make the above top Predictive Analytics results happen:

Access all the Storage Technologies Prescriptive Analytics Public Cloud Storage, Object Storage, Software-Defined Storage, blueprints, presentations and templates and much more in The Art of Service LAB theartofservice.co/lab. Sign up for 7 days free today.

Identity and Access Management Technologies PREDICTIVE ANALYTICS REPORT

 

This Identity and Access Management Technologies report evaluates technologies and applications in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

The Predictive Analytics Scores below – ordered on Forecasted Future Needs and Demand from High to Low – shows you Identity and Access Management Technologies’s Predictive Analysis. The link takes you to a corresponding product in The Art of Service’s store to get started.

The Art of Service’s predictive model results enable businesses to discover and apply the most profitable technologies and applications, attracting the most profitable customers, and therefore helping maximize value from their investments. The Predictive Analytics algorithm evaluates and scores technologies and applications.

The platform monitors over six thousand technologies and applications for months, looking for interest swings in a topic, concept, technology or application, not just a count of mentions. It then makes forecasts about the velocity of the interest over time, with peaks representing it breaking into the mainstream. Data sources include trend data, employment data, employee skills data, and signals like advertising spent, advertisers, search-counts, youtube activity, patents, and books published.

Predictive Analytics Scores:

001066 – Privileged Access Management
000869 – Active Directory Federation Services
000775 – ZXID
000764 – OpenID Connect
000704 – ForgeRock
000559 – IDaaS
000457 – SIEM
000403 – Privileged identity management
000400 – Ubuntu Single Sign On
000388 – OAuth
000385 – OneLogin
000374 – Multi-factor authentication
000346 – NetIQ Access Manager
000312 – FreeIPA
000281 – Social web
000265 – IT Security
000259 – Bitium
000256 – Identity provider
000243 – OpenAM
000232 – NIST
000231 – RBAC
000212 – WSO2
000170 – Oracle Identity Management
000157 – Imprivata
000152 – OpenDJ
000140 – Two-factor authentication
000133 – OpenIDM
000130 – Auth0
000118 – OpenAthens
000116 – Password management
000106 – MyOneLogin
000101 – Social Profiles
000101 – Federated identity
000101 – Facebook connect
000099 – Security Token Service
000093 – Identity management
000085 – Social login
000083 – IdentityServer
000082 – WS-Trust
000082 – Password manager
000081 – Information security
000080 – Identity management systems
000075 – Security token
000072 – OpenID
000071 – Microsoft account
000070 – Information privacy
000067 – Access control
000066 – WS-Security
000056 – SCIM
000056 – Digital signature
000053 – VMware
000053 – Single sign-on
000051 – Identity theft
000051 – Identity assurance
000048 – Virtual Directories
000047 – Namespace
000042 – LoginRadius
000042 – Electronic Signatures
000040 – Federated Identity Management
000039 – Apache License
000038 – Mutual authentication
000038 – Hardware security module
000038 – Directory service
000038 – COPPA
000037 – Communication protocol
000033 – Public key certificate
000033 – Digital identity
000032 – Ethics and Information Technology
000027 – Workflow application
000026 – LemonLDAP
000025 – Janrain
000022 – Mobile identity management
000022 – Digital Card
000020 – Software token
000019 – Central Authentication Service
000018 – Role-based access control
000017 – Mobile signature
000015 – Computer security
000014 – User modeling
000014 – Security Assertion Markup Language
000014 – Online social networking
000013 – Smart card
000013 – NetIQ
000013 – Inversoft
000009 – Mozilla Persona
000009 – JOSSO
000009 – Common Access Cards
000008 – Kerberos (protocol)
000006 – OECD
000004 – Object identifier
000003 – Pubcookie
000003 – Online identity management
000003 – Digital object identifier
000000 – User Managed Access (UMA)
000000 – User and Entity Behavior Analytics
000000 – Shibboleth (Internet2)
000000 – Seventh Framework Programme
000000 – SAML-based products and services
000000 – Presence-based services
000000 – Phone-as-a-Token Authentication Methods
000000 – Numina Application Framework
000000 – Mobile Single Sign-On
000000 – Microsoft RAA
000000 – Limited Disclosure Technology
000000 – JBoss SSO
000000 – ISO/IEC JTC1
000000 – Internet of Things Authentication
000000 – Initiative For Open Authentication
000000 – Identity-Proofing Services
000000 – Identity-based security
000000 – Identity in the Information Society
000000 – Identity Governance and Administration
000000 – Identity driven networking
000000 – IceWall SSO
000000 – IBM Tivoli Access Manager
000000 – IBM Lightweight Third-Party Authentication
000000 – IBM Enterprise Identity Mapping
000000 – IAM Managed Services
000000 – IAM Consulting and System Integration Services
000000 – High-Assurance Public Identity Provider
000000 – Externalized Authorization Management
000000 – Enterprise Sign On Engine
000000 – Enterprise Digital Rights Management
000000 – Distributed Access Control System
000000 – CoSign single sign on
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Claims-based identity
000000 – Biometric Authentication Methods
000000 – Application Services Governance

Evaluation Criteria Definitions:

Interest and Popularity:

Leaders:

100 – OpenAM
100 – FreeIPA
100 – ForgeRock

Google Trends data for gauging mindshare and awareness, the numbers are relative to their maximum (100), meaning number 100 has maximum interest right now and number 50 has half the interest it had from its peak of 100.

Employment Demand:

Leaders:

019825 – VMware
018370 – Information security
008794 – Access control

Open employment opportunities on the date of this report for the subject. Indicator of the need of employers for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Active Practitioners:

Leaders:

01230547 – VMware
00633219 – Information security
00352452 – Access control

Number of practitioners and professionals which have the subject skill set and experience. Indicator of the need of employers (and availability of employees) for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Monthly Searches:

Leaders:

673000 – VMware
301000 – OECD
090500 – Identity theft

How often a month a search is performed for the keyword/phrase: and indicator of interest in the subject.

Cost per Click:

Leaders:

018.89 – Identity management systems
015.44 – Online identity management
011.69 – SIEM

CPC: The average amount advertisers pay Google anytime someone clicks their own ad for this keyword. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Active Advertisers:

Leaders:

066 – IT Security
057 – Access control
052 – Digital signature

This shows how many unique advertisers have appeared on this subject in the last 12 months. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Patents:

Leaders:

17300000 – IBM Lightweight Third-Party Authentication
17300000 – IBM Enterprise Identity Mapping
11100000 – Access control

Patents issued for the specific subject. Indicator of R&D investments and innovation in the specific subject.

Books in print:

Leaders:

00198319 – IT Security
00021367 – OECD
00017904 – Access control

Number of in-print books that cover the subject. Indicator of the need for knowledge sharing and its availability.

Youtube content:

Leaders:

01100000 – COPPA
00540000 – VMware
00473000 – SIEM

Number of youtube content videos that cover the subject. Indicator of the need for knowledge sharing and its availability.

Complete Overview:

Interest and Popularity

100 – OpenAM
100 – FreeIPA
100 – ForgeRock
100 – Bitium
100 – Auth0
096 – OpenID Connect
096 – OneLogin
096 – IdentityServer
094 – WSO2
089 – Social login
089 – Imprivata
086 – Social Profiles
086 – Security token
085 – OpenDJ
085 – IT Security
083 – SIEM
083 – Privileged identity management
083 – Identity provider
079 – OAuth
074 – Privileged Access Management
072 – Digital signature
070 – Microsoft account
070 – IDaaS
069 – Active Directory Federation Services
068 – Software token
068 – Social web
068 – OpenIDM
068 – COPPA
067 – NetIQ Access Manager
063 – Password manager
058 – RBAC
056 – Mobile signature
055 – Security Token Service
053 – Apache License
052 – Multi-factor authentication
049 – OpenAthens
048 – Two-factor authentication
048 – LoginRadius
047 – Facebook connect
042 – Password management
041 – Namespace
036 – Public key certificate
036 – Identity management
035 – Digital identity
033 – VMware
031 – ZXID
031 – Oracle Identity Management
030 – JOSSO
029 – OECD
029 – Object identifier
028 – Janrain
028 – Information security
027 – Information privacy
027 – Access control
026 – Smart card
026 – Mutual authentication
024 – Hardware security module
024 – Central Authentication Service
023 – Workflow application
023 – NIST
022 – Computer security
020 – Communication protocol
019 – Online social networking
019 – LemonLDAP
018 – MyOneLogin
018 – Identity assurance
018 – Federated identity
018 – Electronic Signatures
017 – Digital object identifier
016 – SCIM
016 – Directory service
015 – Ethics and Information Technology
014 – Kerberos (protocol)
013 – Seventh Framework Programme
013 – Mobile identity management
013 – Federated Identity Management
012 – Ubuntu Single Sign On
012 – Single sign-on
012 – OpenID
012 – Online identity management
012 – Identity theft
012 – Digital Card
011 – User modeling
009 – WS-Trust
009 – Virtual Directories
009 – Identity management systems
008 – WS-Security
007 – NetIQ
007 – Inversoft
004 – Role-based access control
004 – Common Access Cards
003 – Mozilla Persona
002 – Security Assertion Markup Language
001 – Pubcookie
000 – User Managed Access (UMA)
000 – User and Entity Behavior Analytics
000 – Shibboleth (Internet2)
000 – SAML-based products and services
000 – Presence-based services
000 – Phone-as-a-Token Authentication Methods
000 – Numina Application Framework
000 – Mobile Single Sign-On
000 – Microsoft RAA
000 – Limited Disclosure Technology
000 – JBoss SSO
000 – ISO/IEC JTC1
000 – Internet of Things Authentication
000 – Initiative For Open Authentication
000 – Identity-Proofing Services
000 – Identity-based security
000 – Identity in the Information Society
000 – Identity Governance and Administration
000 – Identity driven networking
000 – IceWall SSO
000 – IBM Tivoli Access Manager
000 – IBM Lightweight Third-Party Authentication
000 – IBM Enterprise Identity Mapping
000 – IAM Managed Services
000 – IAM Consulting and System Integration Services
000 – High-Assurance Public Identity Provider
000 – Externalized Authorization Management
000 – Enterprise Sign On Engine
000 – Enterprise Digital Rights Management
000 – Distributed Access Control System
000 – CoSign single sign on
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Claims-based identity
000 – Biometric Authentication Methods
000 – Application Services Governance

Employment Demand:

019825 – VMware
018370 – Information security
008794 – Access control
007127 – IT Security
005080 – NIST
002903 – SIEM
002821 – Identity management
002277 – Single sign-on
002127 – Computer security
001438 – Identity theft
001156 – OAuth
000778 – Social web
000393 – Information privacy
000358 – Communication protocol
000356 – Multi-factor authentication
000322 – RBAC
000300 – Two-factor authentication
000266 – Active Directory Federation Services
000254 – OpenID
000219 – WS-Security
000214 – NetIQ
000212 – Role-based access control
000195 – Federated identity
000187 – Password management
000183 – Directory service
000161 – Oracle Identity Management
000158 – Smart card
000150 – Privileged Access Management
000141 – Identity management systems
000133 – Online social networking
000122 – Electronic Signatures
000105 – WSO2
000090 – Workflow application
000090 – OpenID Connect
000087 – ForgeRock
000086 – Digital signature
000078 – OECD
000059 – Microsoft account
000058 – Federated Identity Management
000056 – IBM Tivoli Access Manager
000055 – Imprivata
000052 – IDaaS
000052 – Digital identity
000048 – Privileged identity management
000048 – Facebook connect
000047 – OpenAM
000044 – WS-Trust
000042 – SCIM
000040 – Social Profiles
000039 – Virtual Directories
000038 – Password manager
000037 – Identity provider
000033 – Namespace
000033 – COPPA
000031 – OneLogin
000026 – Identity assurance
000021 – Hardware security module
000020 – User modeling
000019 – Security Assertion Markup Language
000019 – Common Access Cards
000018 – Identity Governance and Administration
000018 – FreeIPA
000016 – Digital Card
000014 – OpenDJ
000013 – Mutual authentication
000011 – Social login
000011 – NetIQ Access Manager
000010 – Security token
000010 – Ethics and Information Technology
000008 – Janrain
000007 – OpenIDM
000006 – Auth0
000005 – Security Token Service
000005 – Enterprise Digital Rights Management
000004 – Central Authentication Service
000003 – Bitium
000002 – OpenAthens
000002 – Mobile Single Sign-On
000002 – Mobile identity management
000002 – JOSSO
000002 – Identity-based security
000002 – Claims-based identity
000002 – Apache License
000001 – Software token
000001 – Public key certificate
000001 – Online identity management
000001 – Kerberos (protocol)
000001 – ISO/IEC JTC1
000001 – Externalized Authorization Management
000000 – ZXID
000000 – User Managed Access (UMA)
000000 – User and Entity Behavior Analytics
000000 – Ubuntu Single Sign On
000000 – Shibboleth (Internet2)
000000 – Seventh Framework Programme
000000 – SAML-based products and services
000000 – Pubcookie
000000 – Presence-based services
000000 – Phone-as-a-Token Authentication Methods
000000 – Object identifier
000000 – Numina Application Framework
000000 – MyOneLogin
000000 – Mozilla Persona
000000 – Mobile signature
000000 – Microsoft RAA
000000 – LoginRadius
000000 – Limited Disclosure Technology
000000 – LemonLDAP
000000 – JBoss SSO
000000 – Inversoft
000000 – Internet of Things Authentication
000000 – Initiative For Open Authentication
000000 – IdentityServer
000000 – Identity-Proofing Services
000000 – Identity in the Information Society
000000 – Identity driven networking
000000 – IceWall SSO
000000 – IBM Lightweight Third-Party Authentication
000000 – IBM Enterprise Identity Mapping
000000 – IAM Managed Services
000000 – IAM Consulting and System Integration Services
000000 – High-Assurance Public Identity Provider
000000 – Enterprise Sign On Engine
000000 – Distributed Access Control System
000000 – Digital object identifier
000000 – CoSign single sign on
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Biometric Authentication Methods
000000 – Application Services Governance

Active Practitioners:

01230547 – VMware
00633219 – Information security
00352452 – Access control
00321947 – Computer security
00228615 – IT Security
00108755 – Identity management
00052678 – SIEM
00052011 – Single sign-on
00050303 – NIST
00039832 – OECD
00033775 – Identity theft
00032115 – Smart card
00023528 – OAuth
00019213 – Communication protocol
00018857 – Social web
00017493 – Online social networking
00015180 – Information privacy
00011795 – NetIQ
00011105 – Digital signature
00010250 – Two-factor authentication
00008077 – RBAC
00007690 – Workflow application
00007648 – Directory service
00006746 – Password management
00005880 – COPPA
00005791 – Microsoft account
00005466 – Digital identity
00005204 – Electronic Signatures
00004956 – Multi-factor authentication
00004821 – Role-based access control
00004649 – WSO2
00004258 – OpenID
00003462 – Federated identity
00003401 – Social Profiles
00003184 – Seventh Framework Programme
00003119 – Imprivata
00002930 – Oracle Identity Management
00002913 – Password manager
00002883 – Namespace
00002663 – WS-Security
00002230 – Facebook connect
00002113 – Active Directory Federation Services
00001934 – OpenAM
00001875 – Federated Identity Management
00001578 – Identity management systems
00001574 – User modeling
00001337 – Hardware security module
00001236 – ForgeRock
00001199 – Identity provider
00001196 – SCIM
00001151 – Social login
00001150 – Security token
00001131 – OpenID Connect
00001041 – Privileged Access Management
00001007 – IBM Tivoli Access Manager
00000989 – Privileged identity management
00000919 – Identity assurance
00000913 – Janrain
00000887 – Mutual authentication
00000880 – Digital Card
00000809 – Common Access Cards
00000781 – OpenDJ
00000773 – OneLogin
00000731 – Virtual Directories
00000689 – Object identifier
00000651 – IDaaS
00000644 – JOSSO
00000576 – FreeIPA
00000571 – Digital object identifier
00000531 – ISO/IEC JTC1
00000510 – Central Authentication Service
00000483 – WS-Trust
00000463 – Ethics and Information Technology
00000461 – Auth0
00000358 – OpenIDM
00000350 – Online identity management
00000344 – Software token
00000323 – Mobile signature
00000279 – Security Token Service
00000276 – Security Assertion Markup Language
00000274 – Apache License
00000213 – NetIQ Access Manager
00000186 – Kerberos (protocol)
00000164 – Identity Governance and Administration
00000163 – Claims-based identity
00000147 – Identity-based security
00000116 – Mobile identity management
00000116 – IdentityServer
00000116 – Bitium
00000114 – LoginRadius
00000108 – Public key certificate
00000083 – OpenAthens
00000073 – LemonLDAP
00000067 – Enterprise Digital Rights Management
00000055 – Inversoft
00000041 – Mobile Single Sign-On
00000040 – Identity in the Information Society
00000036 – Application Services Governance
00000035 – Pubcookie
00000034 – Mozilla Persona
00000031 – Distributed Access Control System
00000025 – User Managed Access (UMA)
00000024 – Presence-based services
00000024 – Biometric Authentication Methods
00000021 – User and Entity Behavior Analytics
00000021 – JBoss SSO
00000017 – MyOneLogin
00000015 – Initiative For Open Authentication
00000010 – IAM Managed Services
00000009 – Shibboleth (Internet2)
00000008 – Internet of Things Authentication
00000006 – Identity-Proofing Services
00000006 – IceWall SSO
00000004 – ZXID
00000004 – Externalized Authorization Management
00000003 – Ubuntu Single Sign On
00000003 – IBM Enterprise Identity Mapping
00000002 – Identity driven networking
00000002 – CoSign single sign on
00000001 – Microsoft RAA
00000000 – SAML-based products and services
00000000 – Phone-as-a-Token Authentication Methods
00000000 – Numina Application Framework
00000000 – Limited Disclosure Technology
00000000 – IBM Lightweight Third-Party Authentication
00000000 – IAM Consulting and System Integration Services
00000000 – High-Assurance Public Identity Provider
00000000 – Enterprise Sign On Engine
00000000 – Cloud Computing and the Enterprise-Defined Data Center

Monthly Searches:

673000 – VMware
301000 – OECD
090500 – Identity theft
074000 – NIST
060500 – Password manager
049500 – SIEM
049500 – OAuth
040500 – Digital signature
040500 – COPPA
033100 – Smart card
027100 – Single sign-on
027100 – OpenID
022200 – RBAC
022200 – Information security
018100 – Computer security
014800 – Two-factor authentication
014800 – Namespace
014800 – Access control
012100 – IT Security
009900 – OneLogin
006600 – NetIQ
006600 – Identity management
005400 – SCIM
004410 – OpenID Connect
002910 – Active Directory Federation Services
002400 – Password management
002400 – Digital identity
001890 – Social web
001890 – Security token
001890 – Hardware security module
001890 – Electronic Signatures
001890 – Communication protocol
001590 – JOSSO
001590 – Digital object identifier
001290 – Oracle Identity Management
001290 – Central Authentication Service
000990 – Mutual authentication
000990 – Information privacy
000990 – Federated Identity Management
000990 – Digital Card
000870 – WS-Trust
000870 – Online social networking
000870 – Federated identity
000870 – Directory service
000720 – Seventh Framework Programme
000720 – Security Token Service
000720 – Public key certificate
000480 – Privileged identity management
000390 – Object identifier
000330 – Workflow application
000330 – Software token
000330 – Ethics and Information Technology
000270 – Privileged Access Management
000180 – Online identity management
000180 – Identity assurance
000180 – Biometric Authentication Methods
000150 – Identity management systems
000060 – Mobile identity management
000060 – Common Access Cards
000030 – Enterprise Digital Rights Management
000000 – ZXID
000000 – WSO2
000000 – WS-Security
000000 – Virtual Directories
000000 – User modeling
000000 – User Managed Access (UMA)
000000 – User and Entity Behavior Analytics
000000 – Ubuntu Single Sign On
000000 – Social Profiles
000000 – Social login
000000 – Shibboleth (Internet2)
000000 – Security Assertion Markup Language
000000 – SAML-based products and services
000000 – Role-based access control
000000 – Pubcookie
000000 – Presence-based services
000000 – Phone-as-a-Token Authentication Methods
000000 – OpenIDM
000000 – OpenDJ
000000 – OpenAthens
000000 – OpenAM
000000 – Numina Application Framework
000000 – NetIQ Access Manager
000000 – MyOneLogin
000000 – Multi-factor authentication
000000 – Mozilla Persona
000000 – Mobile Single Sign-On
000000 – Mobile signature
000000 – Microsoft RAA
000000 – Microsoft account
000000 – LoginRadius
000000 – Limited Disclosure Technology
000000 – LemonLDAP
000000 – Kerberos (protocol)
000000 – JBoss SSO
000000 – Janrain
000000 – ISO/IEC JTC1
000000 – Inversoft
000000 – Internet of Things Authentication
000000 – Initiative For Open Authentication
000000 – Imprivata
000000 – IdentityServer
000000 – Identity-Proofing Services
000000 – Identity-based security
000000 – Identity provider
000000 – Identity in the Information Society
000000 – Identity Governance and Administration
000000 – Identity driven networking
000000 – IDaaS
000000 – IceWall SSO
000000 – IBM Tivoli Access Manager
000000 – IBM Lightweight Third-Party Authentication
000000 – IBM Enterprise Identity Mapping
000000 – IAM Managed Services
000000 – IAM Consulting and System Integration Services
000000 – High-Assurance Public Identity Provider
000000 – FreeIPA
000000 – ForgeRock
000000 – Facebook connect
000000 – Externalized Authorization Management
000000 – Enterprise Sign On Engine
000000 – Distributed Access Control System
000000 – CoSign single sign on
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Claims-based identity
000000 – Bitium
000000 – Auth0
000000 – Application Services Governance
000000 – Apache License

Cost per Click:

018.89 – Identity management systems
015.44 – Online identity management
011.69 – SIEM
011.00 – Federated identity
010.47 – Identity management
010.02 – Single sign-on
009.23 – Software token
008.11 – Digital signature
008.03 – Oracle Identity Management
007.68 – Identity theft
007.64 – Electronic Signatures
007.59 – Workflow application
007.50 – IT Security
006.78 – OpenID Connect
006.71 – Security Token Service
006.44 – Online social networking
006.37 – WS-Trust
006.10 – Mutual authentication
006.07 – Enterprise Digital Rights Management
005.95 – Privileged identity management
005.91 – NetIQ
005.82 – Information security
005.81 – OAuth
005.67 – Active Directory Federation Services
005.48 – Two-factor authentication
005.11 – Password management
005.03 – Mobile identity management
004.97 – Biometric Authentication Methods
004.96 – Hardware security module
004.13 – Access control
004.01 – NIST
004.00 – Directory service
003.89 – Password manager
003.81 – Computer security
003.59 – Namespace
003.29 – Security token
003.22 – Common Access Cards
003.08 – Smart card
003.03 – JOSSO
002.71 – Digital identity
002.42 – SCIM
002.33 – Ethics and Information Technology
001.40 – Federated Identity Management
001.30 – COPPA
001.09 – Communication protocol
000.94 – Privileged Access Management
000.90 – Information privacy
000.37 – OECD
000.36 – RBAC
000.31 – OneLogin
000.27 – Digital Card
000.22 – VMware
000.17 – Public key certificate
000.17 – Central Authentication Service
000.10 – Seventh Framework Programme
000.10 – Digital object identifier
000.05 – OpenID
000.05 – Object identifier
000.04 – Social web
000.03 – Identity assurance
000.00 – ZXID
000.00 – WSO2
000.00 – WS-Security
000.00 – Virtual Directories
000.00 – User modeling
000.00 – User Managed Access (UMA)
000.00 – User and Entity Behavior Analytics
000.00 – Ubuntu Single Sign On
000.00 – Social Profiles
000.00 – Social login
000.00 – Shibboleth (Internet2)
000.00 – Security Assertion Markup Language
000.00 – SAML-based products and services
000.00 – Role-based access control
000.00 – Pubcookie
000.00 – Presence-based services
000.00 – Phone-as-a-Token Authentication Methods
000.00 – OpenIDM
000.00 – OpenDJ
000.00 – OpenAthens
000.00 – OpenAM
000.00 – Numina Application Framework
000.00 – NetIQ Access Manager
000.00 – MyOneLogin
000.00 – Multi-factor authentication
000.00 – Mozilla Persona
000.00 – Mobile Single Sign-On
000.00 – Mobile signature
000.00 – Microsoft RAA
000.00 – Microsoft account
000.00 – LoginRadius
000.00 – Limited Disclosure Technology
000.00 – LemonLDAP
000.00 – Kerberos (protocol)
000.00 – JBoss SSO
000.00 – Janrain
000.00 – ISO/IEC JTC1
000.00 – Inversoft
000.00 – Internet of Things Authentication
000.00 – Initiative For Open Authentication
000.00 – Imprivata
000.00 – IdentityServer
000.00 – Identity-Proofing Services
000.00 – Identity-based security
000.00 – Identity provider
000.00 – Identity in the Information Society
000.00 – Identity Governance and Administration
000.00 – Identity driven networking
000.00 – IDaaS
000.00 – IceWall SSO
000.00 – IBM Tivoli Access Manager
000.00 – IBM Lightweight Third-Party Authentication
000.00 – IBM Enterprise Identity Mapping
000.00 – IAM Managed Services
000.00 – IAM Consulting and System Integration Services
000.00 – High-Assurance Public Identity Provider
000.00 – FreeIPA
000.00 – ForgeRock
000.00 – Facebook connect
000.00 – Externalized Authorization Management
000.00 – Enterprise Sign On Engine
000.00 – Distributed Access Control System
000.00 – CoSign single sign on
000.00 – Cloud Computing and the Enterprise-Defined Data Center
000.00 – Claims-based identity
000.00 – Bitium
000.00 – Auth0
000.00 – Application Services Governance
000.00 – Apache License

Active Advertisers

066 – IT Security
057 – Access control
052 – Digital signature
050 – Mobile identity management
050 – Identity management
050 – Electronic Signatures
049 – Online identity management
048 – Identity management systems
047 – Computer security
046 – Workflow application
045 – Information security
043 – Two-factor authentication
040 – Multi-factor authentication
039 – Single sign-on
036 – Identity theft
035 – SIEM
035 – Password management
034 – Privileged identity management
028 – Privileged Access Management
027 – Federated Identity Management
026 – Enterprise Digital Rights Management
022 – Password manager
020 – Oracle Identity Management
018 – Smart card
016 – Security token
014 – Federated identity
014 – Biometric Authentication Methods
013 – Online social networking
010 – Active Directory Federation Services
009 – Software token
009 – Digital identity
008 – Identity Governance and Administration
007 – RBAC
007 – Central Authentication Service
006 – Hardware security module
005 – Security Token Service
005 – OneLogin
005 – Common Access Cards
004 – VMware
004 – Digital Card
003 – Social web
003 – OAuth
003 – NetIQ Access Manager
003 – Janrain
003 – Information privacy
003 – Ethics and Information Technology
003 – Directory service
002 – WSO2
002 – OpenID
002 – NIST
002 – Imprivata
001 – SCIM
001 – Public key certificate
001 – OpenID Connect
001 – COPPA
001 – Bitium
000 – ZXID
000 – WS-Trust
000 – WS-Security
000 – Virtual Directories
000 – User modeling
000 – User Managed Access (UMA)
000 – User and Entity Behavior Analytics
000 – Ubuntu Single Sign On
000 – Social Profiles
000 – Social login
000 – Shibboleth (Internet2)
000 – Seventh Framework Programme
000 – Security Assertion Markup Language
000 – SAML-based products and services
000 – Role-based access control
000 – Pubcookie
000 – Presence-based services
000 – Phone-as-a-Token Authentication Methods
000 – OpenIDM
000 – OpenDJ
000 – OpenAthens
000 – OpenAM
000 – OECD
000 – Object identifier
000 – Numina Application Framework
000 – NetIQ
000 – Namespace
000 – MyOneLogin
000 – Mutual authentication
000 – Mozilla Persona
000 – Mobile Single Sign-On
000 – Mobile signature
000 – Microsoft RAA
000 – Microsoft account
000 – LoginRadius
000 – Limited Disclosure Technology
000 – LemonLDAP
000 – Kerberos (protocol)
000 – JOSSO
000 – JBoss SSO
000 – ISO/IEC JTC1
000 – Inversoft
000 – Internet of Things Authentication
000 – Initiative For Open Authentication
000 – IdentityServer
000 – Identity-Proofing Services
000 – Identity-based security
000 – Identity provider
000 – Identity in the Information Society
000 – Identity driven networking
000 – Identity assurance
000 – IDaaS
000 – IceWall SSO
000 – IBM Tivoli Access Manager
000 – IBM Lightweight Third-Party Authentication
000 – IBM Enterprise Identity Mapping
000 – IAM Managed Services
000 – IAM Consulting and System Integration Services
000 – High-Assurance Public Identity Provider
000 – FreeIPA
000 – ForgeRock
000 – Facebook connect
000 – Externalized Authorization Management
000 – Enterprise Sign On Engine
000 – Distributed Access Control System
000 – Digital object identifier
000 – CoSign single sign on
000 – Communication protocol
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Claims-based identity
000 – Auth0
000 – Application Services Governance
000 – Apache License

Patents:

17300000 – IBM Lightweight Third-Party Authentication
17300000 – IBM Enterprise Identity Mapping
11100000 – Access control
00663000 – Communication protocol
00151000 – Smart card
00075600 – Digital signature
00046900 – Information security
00038200 – NIST
00031900 – VMware
00029900 – Computer security
00028400 – Namespace
00023400 – Directory service
00023300 – Object identifier
00023000 – Mutual authentication
00022000 – MyOneLogin
00022000 – Mozilla Persona
00019900 – Single sign-on
00014200 – Identity management
00012800 – Identity theft
00010900 – ISO/IEC JTC1
00010600 – Public key certificate
00010200 – Digital Card
00009850 – Security token
00009580 – Online social networking
00008530 – Electronic Signatures
00008120 – OECD
00007300 – Role-based access control
00006010 – Two-factor authentication
00005790 – Multi-factor authentication
00005610 – Digital identity
00004790 – Password management
00004410 – Hardware security module
00003910 – Digital object identifier
00003370 – Identity provider
00003100 – Identity management systems
00002630 – Biometric Authentication Methods
00002610 – Security Assertion Markup Language
00002580 – Information privacy
00002510 – OAuth
00002280 – User modeling
00002260 – Workflow application
00002210 – RBAC
00002150 – NetIQ
00002120 – Federated identity
00002040 – IT Security
00002020 – OpenID
00001730 – SIEM
00001690 – WS-Security
00001530 – Presence-based services
00001420 – Distributed Access Control System
00001320 – Federated Identity Management
00001260 – Social web
00001090 – Identity-based security
00000995 – Kerberos (protocol)
00000969 – SCIM
00000959 – COPPA
00000956 – Imprivata
00000856 – Password manager
00000831 – Software token
00000775 – Security Token Service
00000757 – Virtual Directories
00000757 – Identity-Proofing Services
00000637 – Identity driven networking
00000637 – Identity assurance
00000566 – Facebook connect
00000547 – Online identity management
00000527 – WS-Trust
00000500 – JOSSO
00000493 – Social Profiles
00000443 – Seventh Framework Programme
00000330 – Central Authentication Service
00000209 – Microsoft account
00000202 – Enterprise Digital Rights Management
00000183 – Privileged Access Management
00000147 – Common Access Cards
00000146 – Mobile identity management
00000128 – OpenAM
00000125 – Active Directory Federation Services
00000122 – Mobile signature
00000120 – IBM Tivoli Access Manager
00000119 – Oracle Identity Management
00000111 – Janrain
00000098 – Apache License
00000092 – Bitium
00000086 – Claims-based identity
00000074 – Mobile Single Sign-On
00000072 – OpenID Connect
00000069 – Social login
00000063 – ZXID
00000063 – WSO2
00000055 – Initiative For Open Authentication
00000020 – IDaaS
00000014 – Privileged identity management
00000007 – Shibboleth (Internet2)
00000007 – ForgeRock
00000006 – FreeIPA
00000003 – LoginRadius
00000003 – Identity in the Information Society
00000002 – OneLogin
00000002 – Enterprise Sign On Engine
00000002 – Auth0
00000001 – Pubcookie
00000001 – Ethics and Information Technology
00000000 – User Managed Access (UMA)
00000000 – User and Entity Behavior Analytics
00000000 – Ubuntu Single Sign On
00000000 – SAML-based products and services
00000000 – Phone-as-a-Token Authentication Methods
00000000 – OpenIDM
00000000 – OpenDJ
00000000 – OpenAthens
00000000 – Numina Application Framework
00000000 – NetIQ Access Manager
00000000 – Microsoft RAA
00000000 – Limited Disclosure Technology
00000000 – LemonLDAP
00000000 – JBoss SSO
00000000 – Inversoft
00000000 – Internet of Things Authentication
00000000 – IdentityServer
00000000 – Identity Governance and Administration
00000000 – IceWall SSO
00000000 – IAM Managed Services
00000000 – IAM Consulting and System Integration Services
00000000 – High-Assurance Public Identity Provider
00000000 – Externalized Authorization Management
00000000 – CoSign single sign on
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Application Services Governance

Books in print:

00198319 – IT Security
00021367 – OECD
00017904 – Access control
00014832 – Computer security
00009983 – Information security
00008203 – Identity theft
00006258 – Digital signature
00005916 – Smart card
00005149 – Namespace
00004915 – Communication protocol
00003081 – Role-based access control
00003018 – Directory service
00002658 – NIST
00002644 – Single sign-on
00002419 – ISO/IEC JTC1
00002162 – Social web
00002000 – Identity management
00001986 – Online social networking
00001986 – Electronic Signatures
00001401 – VMware
00001389 – Two-factor authentication
00001109 – Security Assertion Markup Language
00001013 – Microsoft account
00000985 – Public key certificate
00000981 – Object identifier
00000980 – Virtual Directories
00000919 – Information privacy
00000860 – Mutual authentication
00000765 – Digital object identifier
00000698 – SIEM
00000697 – Social Profiles
00000686 – Seventh Framework Programme
00000672 – COPPA
00000563 – Digital identity
00000562 – Security token
00000530 – OAuth
00000525 – Identity provider
00000485 – Password management
00000451 – Multi-factor authentication
00000450 – User modeling
00000425 – RBAC
00000412 – WS-Security
00000400 – Active Directory Federation Services
00000361 – Identity management systems
00000346 – Ethics and Information Technology
00000344 – Password manager
00000335 – OpenID
00000285 – Common Access Cards
00000282 – Facebook connect
00000272 – Federated identity
00000260 – Digital Card
00000255 – Workflow application
00000201 – Hardware security module
00000189 – Federated Identity Management
00000174 – Apache License
00000164 – WS-Trust
00000120 – Security Token Service
00000093 – Kerberos (protocol)
00000077 – Central Authentication Service
00000070 – Identity in the Information Society
00000062 – IBM Tivoli Access Manager
00000062 – Claims-based identity
00000056 – WSO2
00000053 – JOSSO
00000053 – Auth0
00000045 – Distributed Access Control System
00000043 – Identity assurance
00000041 – SCIM
00000040 – Social login
00000040 – OpenID Connect
00000037 – Online identity management
00000035 – Oracle Identity Management
00000030 – IDaaS
00000028 – Mobile identity management
00000026 – Shibboleth (Internet2)
00000026 – Enterprise Digital Rights Management
00000026 – Biometric Authentication Methods
00000018 – Software token
00000018 – Mobile signature
00000015 – OpenAM
00000012 – NetIQ
00000012 – Identity-based security
00000009 – Mozilla Persona
00000009 – Janrain
00000007 – User Managed Access (UMA)
00000007 – FreeIPA
00000006 – Ubuntu Single Sign On
00000006 – Privileged Access Management
00000006 – Initiative For Open Authentication
00000005 – Privileged identity management
00000005 – ForgeRock
00000004 – SAML-based products and services
00000004 – OpenDJ
00000003 – Pubcookie
00000003 – Enterprise Sign On Engine
00000002 – ZXID
00000002 – OpenAthens
00000002 – NetIQ Access Manager
00000002 – Identity-Proofing Services
00000002 – Identity driven networking
00000002 – IBM Lightweight Third-Party Authentication
00000000 – User and Entity Behavior Analytics
00000000 – Presence-based services
00000000 – Phone-as-a-Token Authentication Methods
00000000 – OpenIDM
00000000 – OneLogin
00000000 – Numina Application Framework
00000000 – MyOneLogin
00000000 – Mobile Single Sign-On
00000000 – Microsoft RAA
00000000 – LoginRadius
00000000 – Limited Disclosure Technology
00000000 – LemonLDAP
00000000 – JBoss SSO
00000000 – Inversoft
00000000 – Internet of Things Authentication
00000000 – Imprivata
00000000 – IdentityServer
00000000 – Identity Governance and Administration
00000000 – IceWall SSO
00000000 – IBM Enterprise Identity Mapping
00000000 – IAM Managed Services
00000000 – IAM Consulting and System Integration Services
00000000 – High-Assurance Public Identity Provider
00000000 – Externalized Authorization Management
00000000 – CoSign single sign on
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Bitium
00000000 – Application Services Governance

Youtube content:

01100000 – COPPA
00540000 – VMware
00473000 – SIEM
00215000 – Identity theft
00144000 – NIST
00143000 – Access control
00123000 – Information security
00092900 – OECD
00081800 – IT Security
00061100 – Computer security
00051700 – Smart card
00049600 – Single sign-on
00047400 – RBAC
00039500 – Social web
00036800 – SCIM
00026100 – Digital signature
00025700 – Digital Card
00024900 – OAuth
00024500 – Microsoft account
00024200 – Facebook connect
00020600 – Namespace
00019800 – Identity management
00018700 – Password manager
00016800 – Online social networking
00014400 – Two-factor authentication
00013100 – Digital identity
00011200 – OpenID
00008220 – Password management
00007410 – Social Profiles
00006230 – WSO2
00006220 – Social login
00005900 – Mobile signature
00005540 – Electronic Signatures
00005450 – Multi-factor authentication
00004610 – Information privacy
00004080 – NetIQ
00003770 – JOSSO
00003720 – Role-based access control
00003470 – Directory service
00002230 – Communication protocol
00002180 – Security token
00002100 – Federated identity
00002060 – OpenID Connect
00002030 – Active Directory Federation Services
00001840 – ForgeRock
00001770 – OpenAM
00001590 – Workflow application
00001330 – Imprivata
00001290 – Auth0
00001220 – Seventh Framework Programme
00001220 – Oracle Identity Management
00001210 – Janrain
00001100 – WS-Security
00001060 – Privileged Access Management
00001060 – FreeIPA
00000989 – Security Token Service
00000930 – Bitium
00000884 – OneLogin
00000874 – Privileged identity management
00000838 – Federated Identity Management
00000763 – IDaaS
00000720 – Central Authentication Service
00000672 – Identity provider
00000615 – Hardware security module
00000592 – Software token
00000536 – OpenDJ
00000533 – Virtual Directories
00000515 – Identity assurance
00000513 – WS-Trust
00000459 – Identity management systems
00000456 – Claims-based identity
00000424 – Apache License
00000411 – OpenIDM
00000400 – User modeling
00000389 – Object identifier
00000378 – Ethics and Information Technology
00000354 – Mutual authentication
00000311 – Digital object identifier
00000291 – Mozilla Persona
00000262 – Online identity management
00000251 – IBM Tivoli Access Manager
00000245 – LoginRadius
00000227 – OpenAthens
00000215 – NetIQ Access Manager
00000195 – MyOneLogin
00000191 – Mobile identity management
00000178 – IdentityServer
00000128 – Security Assertion Markup Language
00000122 – Common Access Cards
00000120 – Kerberos (protocol)
00000094 – Shibboleth (Internet2)
00000089 – Enterprise Digital Rights Management
00000088 – Identity-based security
00000085 – LemonLDAP
00000082 – ZXID
00000064 – Identity Governance and Administration
00000062 – User Managed Access (UMA)
00000059 – Inversoft
00000049 – ISO/IEC JTC1
00000041 – Public key certificate
00000020 – Application Services Governance
00000017 – Biometric Authentication Methods
00000014 – Identity in the Information Society
00000014 – Distributed Access Control System
00000008 – SAML-based products and services
00000008 – Initiative For Open Authentication
00000008 – Identity driven networking
00000004 – Pubcookie
00000004 – Mobile Single Sign-On
00000004 – IBM Lightweight Third-Party Authentication
00000004 – Enterprise Sign On Engine
00000003 – JBoss SSO
00000003 – CoSign single sign on
00000002 – Ubuntu Single Sign On
00000001 – User and Entity Behavior Analytics
00000001 – Presence-based services
00000000 – Phone-as-a-Token Authentication Methods
00000000 – Numina Application Framework
00000000 – Microsoft RAA
00000000 – Limited Disclosure Technology
00000000 – Internet of Things Authentication
00000000 – Identity-Proofing Services
00000000 – IceWall SSO
00000000 – IBM Enterprise Identity Mapping
00000000 – IAM Managed Services
00000000 – IAM Consulting and System Integration Services
00000000 – High-Assurance Public Identity Provider
00000000 – Externalized Authorization Management
00000000 – Cloud Computing and the Enterprise-Defined Data Center

Start with Privileged Access Management, Active Directory Federation Services, ZXID, and make the above top Predictive Analytics results happen:

Access all the Identity and Access Management Technologies Prescriptive Analytics Privileged Access Management, Active Directory Federation Services, ZXID, blueprints, presentations and templates and much more in The Art of Service LAB theartofservice.co/lab. Sign up for 7 days free today.

Business Intelligence and Analytics PREDICTIVE ANALYTICS REPORT

 

This Business Intelligence and Analytics report evaluates technologies and applications in terms of their business impact, adoption rate and maturity level to help users decide where and when to invest.

This predictive analytics helps IT leaders modernize their business intelligence and analytics programs by prioritizing emerging technology investments.

The Predictive Analytics Scores below – ordered on Forecasted Future Needs and Demand from High to Low – shows you Business Intelligence and Analytics’s Predictive Analysis. The link takes you to a corresponding product in The Art of Service’s store to get started.

The Art of Service’s predictive model results enable businesses to discover and apply the most profitable technologies and applications, attracting the most profitable customers, and therefore helping maximize value from their investments. The Predictive Analytics algorithm evaluates and scores technologies and applications.

The platform monitors over six thousand technologies and applications for months, looking for interest swings in a topic, concept, technology or application, not just a count of mentions. It then makes forecasts about the velocity of the interest over time, with peaks representing it breaking into the mainstream. Data sources include trend data, employment data, employee skills data, and signals like advertising spent, advertisers, search-counts, youtube activity, patents, and books published.

Predictive Analytics Scores:

008692 – Prescriptive Analytics
005391 – Decision Management
000364 – Big Data
000258 – Predictive Analytics
000167 – Text Analytics
000148 – Event Stream Processing
000142 – Logical Data Warehouse
000092 – Business Analytics Services
000091 – Graph Analysis
000075 – Mobile BI
000066 – Open Data
000036 – Personal Analytics
000007 – Visual Data Discovery
000000 – Smart Data Discovery
000000 – Self-Service Data Preparation
000000 – Search-Based Data Discovery Tools
000000 – Operational Intelligence Platforms
000000 – Natural-Language Question Answering
000000 – Natural-Language Generation
000000 – Hadoop-Based Data Discovery
000000 – Governed Data Discovery
000000 – Geospatial and Location Intelligence
000000 – Data and Analytics Leaders Key Initiative Overview
000000 – Context Brokering Platforms
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Business Analytics PaaS (baPaaS)

Evaluation Criteria Definitions:

Interest and Popularity:

Leaders:

100 – Prescriptive Analytics
098 – Predictive Analytics
091 – Text Analytics

Google Trends data for gauging mindshare and awareness, the numbers are relative to their maximum (100), meaning number 100 has maximum interest right now and number 50 has half the interest it had from its peak of 100.

Employment Demand:

Leaders:

021063 – Big Data
002391 – Predictive Analytics
000260 – Text Analytics

Open employment opportunities on the date of this report for the subject. Indicator of the need of employers for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Active Practitioners:

Leaders:

00520419 – Big Data
00090951 – Predictive Analytics
00025508 – Open Data

Number of practitioners and professionals which have the subject skill set and experience. Indicator of the need of employers (and availability of employees) for this specific skill set and therefore their organization’s application of it in relation to the other subjects.

Monthly Searches:

Leaders:

246000 – Big Data
022200 – Open Data
018100 – Predictive Analytics

How often a month a search is performed for the keyword/phrase: and indicator of interest in the subject.

Cost per Click:

Leaders:

019.51 – Predictive Analytics
019.27 – Business Analytics Services
014.53 – Big Data

CPC: The average amount advertisers pay Google anytime someone clicks their own ad for this keyword. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Active Advertisers:

Leaders:

051 – Big Data
049 – Business Analytics Services
046 – Predictive Analytics

This shows how many unique advertisers have appeared on this subject in the last 12 months. Indicator of the advertising being spent on the topic ergo investments being made to attract clients.

Patents:

Leaders:

00007530 – Big Data
00007060 – Open Data
00002620 – Decision Management

Patents issued for the specific subject. Indicator of R&D investments and innovation in the specific subject.

Books in print:

Leaders:

00007709 – Big Data
00001513 – Open Data
00001163 – Predictive Analytics

Number of in-print books that cover the subject. Indicator of the need for knowledge sharing and its availability.

Youtube content:

Leaders:

04060000 – Big Data
00122000 – Open Data
00099000 – Predictive Analytics

Number of youtube content videos that cover the subject. Indicator of the need for knowledge sharing and its availability.

Complete Overview:

Interest and Popularity

100 – Prescriptive Analytics
098 – Predictive Analytics
091 – Text Analytics
090 – Open Data
090 – Big Data
065 – Personal Analytics
061 – Mobile BI
040 – Graph Analysis
038 – Business Analytics Services
032 – Decision Management
024 – Event Stream Processing
020 – Logical Data Warehouse
011 – Visual Data Discovery
000 – Smart Data Discovery
000 – Self-Service Data Preparation
000 – Search-Based Data Discovery Tools
000 – Operational Intelligence Platforms
000 – Natural-Language Question Answering
000 – Natural-Language Generation
000 – Hadoop-Based Data Discovery
000 – Governed Data Discovery
000 – Geospatial and Location Intelligence
000 – Data and Analytics Leaders Key Initiative Overview
000 – Context Brokering Platforms
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Business Analytics PaaS (baPaaS)

Employment Demand:

021063 – Big Data
002391 – Predictive Analytics
000260 – Text Analytics
000219 – Decision Management
000186 – Open Data
000113 – Prescriptive Analytics
000046 – Graph Analysis
000033 – Mobile BI
000020 – Natural-Language Generation
000012 – Logical Data Warehouse
000009 – Business Analytics Services
000008 – Event Stream Processing
000004 – Smart Data Discovery
000003 – Self-Service Data Preparation
000002 – Governed Data Discovery
000001 – Personal Analytics
000000 – Visual Data Discovery
000000 – Search-Based Data Discovery Tools
000000 – Operational Intelligence Platforms
000000 – Natural-Language Question Answering
000000 – Hadoop-Based Data Discovery
000000 – Geospatial and Location Intelligence
000000 – Data and Analytics Leaders Key Initiative Overview
000000 – Context Brokering Platforms
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Business Analytics PaaS (baPaaS)

Active Practitioners:

00520419 – Big Data
00090951 – Predictive Analytics
00025508 – Open Data
00014165 – Text Analytics
00002686 – Mobile BI
00002013 – Graph Analysis
00000877 – Natural-Language Generation
00000370 – Business Analytics Services
00000181 – Personal Analytics
00000169 – Logical Data Warehouse
00000148 – Visual Data Discovery
00000130 – Self-Service Data Preparation
00000130 – Search-Based Data Discovery Tools
00000130 – Prescriptive Analytics
00000130 – Geospatial and Location Intelligence
00000130 – Event Stream Processing
00000130 – Decision Management
00000085 – Natural-Language Question Answering
00000050 – Smart Data Discovery
00000043 – Governed Data Discovery
00000016 – Operational Intelligence Platforms
00000007 – Hadoop-Based Data Discovery
00000000 – Data and Analytics Leaders Key Initiative Overview
00000000 – Context Brokering Platforms
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Business Analytics PaaS (baPaaS)

Monthly Searches:

246000 – Big Data
022200 – Open Data
018100 – Predictive Analytics
002400 – Text Analytics
000870 – Mobile BI
000870 – Graph Analysis
000480 – Decision Management
000330 – Logical Data Warehouse
000270 – Event Stream Processing
000090 – Business Analytics Services
000000 – Visual Data Discovery
000000 – Smart Data Discovery
000000 – Self-Service Data Preparation
000000 – Search-Based Data Discovery Tools
000000 – Prescriptive Analytics
000000 – Personal Analytics
000000 – Operational Intelligence Platforms
000000 – Natural-Language Question Answering
000000 – Natural-Language Generation
000000 – Hadoop-Based Data Discovery
000000 – Governed Data Discovery
000000 – Geospatial and Location Intelligence
000000 – Data and Analytics Leaders Key Initiative Overview
000000 – Context Brokering Platforms
000000 – Cloud Computing and the Enterprise-Defined Data Center
000000 – Business Analytics PaaS (baPaaS)

Cost per Click:

019.51 – Predictive Analytics
019.27 – Business Analytics Services
014.53 – Big Data
006.95 – Mobile BI
005.77 – Text Analytics
004.12 – Logical Data Warehouse
003.24 – Open Data
000.33 – Graph Analysis
000.04 – Event Stream Processing
000.02 – Decision Management
000.00 – Visual Data Discovery
000.00 – Smart Data Discovery
000.00 – Self-Service Data Preparation
000.00 – Search-Based Data Discovery Tools
000.00 – Prescriptive Analytics
000.00 – Personal Analytics
000.00 – Operational Intelligence Platforms
000.00 – Natural-Language Question Answering
000.00 – Natural-Language Generation
000.00 – Hadoop-Based Data Discovery
000.00 – Governed Data Discovery
000.00 – Geospatial and Location Intelligence
000.00 – Data and Analytics Leaders Key Initiative Overview
000.00 – Context Brokering Platforms
000.00 – Cloud Computing and the Enterprise-Defined Data Center
000.00 – Business Analytics PaaS (baPaaS)

Active Advertisers

051 – Big Data
049 – Business Analytics Services
046 – Predictive Analytics
045 – Text Analytics
034 – Mobile BI
022 – Logical Data Warehouse
012 – Governed Data Discovery
009 – Prescriptive Analytics
007 – Open Data
007 – Event Stream Processing
005 – Decision Management
000 – Visual Data Discovery
000 – Smart Data Discovery
000 – Self-Service Data Preparation
000 – Search-Based Data Discovery Tools
000 – Personal Analytics
000 – Operational Intelligence Platforms
000 – Natural-Language Question Answering
000 – Natural-Language Generation
000 – Hadoop-Based Data Discovery
000 – Graph Analysis
000 – Geospatial and Location Intelligence
000 – Data and Analytics Leaders Key Initiative Overview
000 – Context Brokering Platforms
000 – Cloud Computing and the Enterprise-Defined Data Center
000 – Business Analytics PaaS (baPaaS)

Patents:

00007530 – Big Data
00007060 – Open Data
00002620 – Decision Management
00002560 – Predictive Analytics
00002560 – Logical Data Warehouse
00002460 – Graph Analysis
00002010 – Natural-Language Generation
00001390 – Visual Data Discovery
00001390 – Text Analytics
00000854 – Event Stream Processing
00000621 – Natural-Language Question Answering
00000249 – Mobile BI
00000249 – Business Analytics Services
00000045 – Prescriptive Analytics
00000020 – Personal Analytics
00000000 – Smart Data Discovery
00000000 – Self-Service Data Preparation
00000000 – Search-Based Data Discovery Tools
00000000 – Operational Intelligence Platforms
00000000 – Hadoop-Based Data Discovery
00000000 – Governed Data Discovery
00000000 – Geospatial and Location Intelligence
00000000 – Data and Analytics Leaders Key Initiative Overview
00000000 – Context Brokering Platforms
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Business Analytics PaaS (baPaaS)

Books in print:

00007709 – Big Data
00001513 – Open Data
00001163 – Predictive Analytics
00000592 – Natural-Language Generation
00000528 – Decision Management
00000309 – Text Analytics
00000281 – Natural-Language Question Answering
00000217 – Graph Analysis
00000096 – Prescriptive Analytics
00000080 – Event Stream Processing
00000047 – Mobile BI
00000016 – Personal Analytics
00000007 – Visual Data Discovery
00000006 – Business Analytics Services
00000003 – Self-Service Data Preparation
00000003 – Logical Data Warehouse
00000003 – Governed Data Discovery
00000000 – Smart Data Discovery
00000000 – Search-Based Data Discovery Tools
00000000 – Operational Intelligence Platforms
00000000 – Hadoop-Based Data Discovery
00000000 – Geospatial and Location Intelligence
00000000 – Data and Analytics Leaders Key Initiative Overview
00000000 – Context Brokering Platforms
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Business Analytics PaaS (baPaaS)

Youtube content:

04060000 – Big Data
00122000 – Open Data
00099000 – Predictive Analytics
00008170 – Text Analytics
00004440 – Mobile BI
00003830 – Decision Management
00003200 – Graph Analysis
00001260 – Prescriptive Analytics
00000756 – Event Stream Processing
00000491 – Natural-Language Generation
00000458 – Personal Analytics
00000392 – Visual Data Discovery
00000227 – Governed Data Discovery
00000182 – Logical Data Warehouse
00000163 – Self-Service Data Preparation
00000092 – Business Analytics Services
00000053 – Smart Data Discovery
00000047 – Natural-Language Question Answering
00000001 – Operational Intelligence Platforms
00000001 – Geospatial and Location Intelligence
00000000 – Search-Based Data Discovery Tools
00000000 – Hadoop-Based Data Discovery
00000000 – Data and Analytics Leaders Key Initiative Overview
00000000 – Context Brokering Platforms
00000000 – Cloud Computing and the Enterprise-Defined Data Center
00000000 – Business Analytics PaaS (baPaaS)

Start with Prescriptive Analytics, Decision Management, Big Data, and make the above top Predictive Analytics results happen:

Access all the Business Intelligence and Analytics Prescriptive Analytics Prescriptive Analytics, Decision Management, Big Data, blueprints, presentations and templates and much more in The Art of Service LAB theartofservice.co/lab. Sign up for 7 days free today.