DIRECTIVE CONSULTING PORTFOLIO

June 24, 2019

We believe that data-driven marketing shouldn’t be confusing. Every company should know what works for their campaigns in order to make more ROI-driven decisions. At Directive, we not only craft customized campaigns for your unique marketing objectives - we exceed those objectives and truly revolutionize your digital presence. We pride ourselves on the comprehensive and in-depth nature of the campaigns we build. From the outset - we prioritize transparent and accurate tracking to get the best picture of how campaigns are performing.

Spotlight

BlackStratus

BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by ''Security as a Service'' (SECaaS) providers of all sizes, government agencies and individual enterprises. Our SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the ''Cloud.'' The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

OTHER WHITEPAPERS
news image

Maximising theAI opportunity

whitePaper | November 1, 2019

Artificial Intelligence is becoming an ever more important part of our lives. Many of us are already familiar with its everyday applications, such as decluttering our inboxes with spam filters or receiving personalised shopping recommendations. Yet, whether it is powering a new generation of self-driving cars, guarding us against fraud or helping doctors better diagnose health conditions, AI’s transformational abilities are being felt in increasingly ubiquitous and innovative ways.

Read More
news image

Democratizing AI: Transforming Your Operating Model to Support AI Adoption

whitePaper | May 20, 2021

AI has become a strategic imperative. Early adopters are achieving massive returns, while others risk falling behind. Yet, with AI knowledge and resources scarce, most companies cannot copy the FAANG approach. Even if their vast resources were more readily available, it’s hard to reboot an organization without disrupting the bottom line. Most executives need to work with the resources available — their existing people, processes, and technology.

Read More
news image

Artificial Intelligence & Machine Learningin Public Safety

whitePaper | December 15, 2019

Artificial Intelligence (AI), and specifically Machine Learning (ML), are being tested in an increasing number of fields, including data-centric environments. Image or text analysis, speech recognition, chatbot interactions, custom machine learning models… all these are elements that could enable the AI journey of a public safety and security organisation. This document dives into different aspects of integrating AI & ML in Public Safety activities, at different levels and in different domains of activity. It presents ethical and regulatory considerations, real examples from Public Safety Answering Points (PSAPs) and Emergency Response Organisations (EROs), and also initiatives that can benefit the public sector greatly, with a series of recommendations at the end.

Read More
news image

Multilayered cybersecurity: part ofmodern cyber protection

whitePaper | August 10, 2020

Data is the most important asset businesses have. As the world has become increasingly digital, data has grown in volume and value. In fact, this most valuable resource of modern society doubles in volume every year and that growth rate is likely to accelerate even further. Of course, this creates a challenge: how to store data securely and how to be sure that every operation with data is secured? Today loss of data means loss of everything: business, identity, future, and even life in some cases.

Read More
news image

Protecting the Human Side of Cybersecurity

whitePaper | August 1, 2020

The majority of enterprise companies have hundreds of apps deployed in the cloud, and that trend is expected to continue, according to a new survey by IDG. That said, 52% of companies find that securing those apps continues to be challenging. But that doesn’t mean that the remaining 48% are fully confident in their cloud app security or are fully aware of all of the facets of cloud security they should be considering. “Cloud security is a broad issue,” says Jim Fulton, Director, Cloud & Edge Protection Solutions for Forcepoint. “From what I’ve seen, about 10% of companies really understand all of the facets.

Read More
news image

Machine Learning on Arm Cortex-M Microcontrollers

whitePaper | January 20, 2022

Machine learning (ML) algorithms are moving to the IoT edge due to various considerations such as latency, power consumption, cost, network bandwidth, reliability, privacy and security. Hence, there is an increasing interest in developing neural network (NN) solutions to deploy them on low-power edge devices such as the Arm Cortex-M microcontroller systems. To enable that, we present CMSIS-NN, an open-source library of optimized software kernels that maximize the NN performance on Cortex-M cores with minimal memory footprint overhead. We further present methods for NN architecture exploration, using image classification on CIFAR-10 dataset as an example, to develop models that fit on such constrained devices.

Read More

Spotlight

BlackStratus

BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by ''Security as a Service'' (SECaaS) providers of all sizes, government agencies and individual enterprises. Our SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the ''Cloud.'' The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

Events