Prediction Category Definitions

Prophyts Prediction Category Definitions

Prophyts Prediction Categories are unique by design. Our team of industry experts spends countless hours considering the best “Intent” topics to map to a specific prediction category providing a level of efficiency and specificity required for the modern marketer.

Our categories are developed this way to empower marketing and sales teams to quickly leverage curated Intent data as product categories via the Prophyts prediction engine which identifies and monitors priority accounts resulting in more efficient marketing and reduced sales cycles. There is no need to develop a complex model or integrated priority systems. Prophyts is a turnkey solution for what you need today.

If you don’t see your product category on this list, let us know. We can add a custom category for any of your products.

Analytics and Business Intelligence
Advanced Analytics Advanced analytics provides algorithms for complex analysis of either structured or unstructured data. It includes sophisticated statistical models, machine learning, neural networks, text analytics, advanced visualization, and other advanced data mining techniques.
Advanced Analytics Software Software solutions that drive advanced analytics.
Performance Management and Dashboards Tools and techniques for ensuring optimal organizational performance through preparation and use of visual representations of key performance indicators.
Predictive Analytics: Predictive modeling/Machine learning/Neural networks Statistical and mathematical algorithms and techniques which can be used on both structured and unstructured data (together or individually) to determine the probability of future outcomes based on historical data
Prescriptive Analytics Analytics that examines data to suggest actions an enterprise take in response to trends or to avoid future problems.
Visual Analytics Technologies that discover and display the results of data analysis; tools may be display only or allow user to manipulate data to ask "what-if" questions or drill down deeper into specific results. Newer tools automate the discovery of insights.
 
Availability/Backup/Storage
Automated Storage Tiering Software Automatically moves data to different types of storage devices and media to optimize performance, capacity and cost.
Availability and Clustering Software Virtualizes system services of physical or virtual servers so they appear as a single resource.
Data Protection and Recovery Software or services for protecting, restoring and recovering data in case of errors or incidents.
 
Data Center
Private Cloud Computing resources modeled after the scalability and self-service of public cloud computing but with infrastructure maintained by the customer, often on-premise, or by a third-party service provider, for added security and customization.
 
Data Management
Big Data
Data characterized by its large volume, variety (diversity), and speed of creation and processing (velocity). Big data may be structured or unstructured.
Data Governance Solutions Software and hardware products along with policies and practices that help an enterprise meet industry and government regulations and compliance related to data use, availability, storage, security, integrity, and management.
Data Integration Practices, practices, and tools for combining and unifying two or more disparate data sources from one or more locations internal or external to an enterprise
Data Preparation Techniques and processes for improving on data quality and completeness, standardizing data, collecting and consolidating it, and transforming it for reporting and analytics.
Data Quality Techniques to measure and ensure consistent, complete, accurate, and trustworthy data.
Data Security
Data security consists of all of the processes that protect data from unauthorized access, corruption, and usage, as well as upholding privacy policies throughout its lifecycle in the analytics environment.
Data Warehousing Solutions Software and hardware solutions that focus on Data platforms are where data is ingested and persisted to be provisioned for a wide range of applications and operations
ETL solutions Software that focuses on the extraction, transformation, and loading of complete or partial data from a source to a different destination for data integration, reporting, or data quality purposes.
Metadata Management Creation and management of data about data (definition, value limits, origin, restrictions) that ensures data consistency and integration across an enterprise.
Modern Data Management Architectures Technologies that handle today's more demanding data characteristics -- including real-time processing to business intelligence in the cloud -- to satisfy organizations -- demands for new data types, subjects, sources, and targets for both operational and analytics use cases.
Open Source Solutions in which the source code is made available to all without restriction and which is typically modified and redistributed within a community of users.
 
Developer
.NET Development Everything to do with developing for Microsoft's .NET development framework, including the new open source .NET Core framework.
Agile Development
Approaching software development in a collaborative manner with ongoing and constant updates and improvements, as guided by the principles outlined in the agile manifesto.
AI/Machine Learning Algorithms and approaches to data as they relate to artificial intelligence and machine learning projects, no matter the language or platform used.
API Development and Management The code that connects enterprise programs and makes modern development possible.
Application Lifecycle Management (ALM) The process surrounding the design, development and testing of an software application, including ongoing processes such as QA and continuous testing.
Application Performance and Monitoring/Management Monitoring application performance (generally in real-time) and the tools for improving it.
Application/Data Security Tools and approaches to securing applications and code created by enterprise developers.
Big Data Development Everything related to big data development, from architecture to data structures to tools to common languages.
Change/Configuration Management Controlling and documenting changes withing programs and making sure that configurations are managed and optimized (and possibly automated).
Cloud Development Development that touches the cloud in any capacity (vs. locally), often in the form of IaaS and SaaS services.
Database Development & Data Tools Everything to do with how you store and use your data.
IoT Development When developing for data that's not stored on a traditional computing device, that's IoT -- whether commercial, enterprise or industrial, or stored on the cloud or on the edge.
Mobile Development Programming apps and tools used on the wide variety of mobile devices available to enterprise users.
Open Source Development The wide variety of IDEs, databases, tools and other resources open to all and not restricted by a specific vendor's usage requirements.
Software Testing Everything to do with software testing, from quality assurance to continuous testing to automated testing.
SQL Server Microsoft's premier database, often used with .NET installations.
Web Development From HTML, CSS, JavaScript, Angular, covering both the front-end and back-end of Web-related enterprise development.
 
Emerging Tech
Blockchain Platform A distributed database ledger technology that continuously grow with an immutable ledge for recording the history of transactions.
Digital Transformation Making business processes significantly better through the use of digital technology, especially involving Big Data, Artificial Intelligence and the Internet of Things.
 
Security
Application Security Protecting applications from external threats using software, services, hardware and procedures.
Cloud Security Technologies and policies for defending cloud systems and data.
Data Breach Response Requirements, procedures, services and tools for reacting to a loss of data.
DDoS Attack Monitoring Technologies to defend against distributed denial-of-service attacks.
Endpoint Security Securing the corporate network for access from remote devices.
Firewall Security Protecting the network through packet filtering and monitoring.
Fraud Detection And Prevention Techniques and services for blocking or mitigating illegal activity.
Hybrid Cloud Security Protecting cloud computing environments that consist of a mix of on-premises, private cloud and public-cloud services.
Messaging Security Methods and tools for defending email from viruses, spam, phishing and other attacks.
Mobile Security Tools and techniques for securely managing mobile devices.
Network Security Methods and tools for defending computer networks against attacks.
Ransomware Malware that uses encryption to lock computer systems and data, unlocking them in exchange for a ransom payment.
Secure File Sharing Systems for storing and exchanging files remotely using encryption.
Security and Vulnerability Management Software Periodic identification, classification, remediation and mitigation of software vulnerabilities.
Security Information And Event Management Products and services that bring together security information management with security event management.
Web Security Tools and techniques for securing websites, web applications and web services.
 
Virtualization and Cloud
Cloud Storage Data storage on remote servers that can be accessed over the Internet.
Containers Virtual images of applications that run inside an operating system, allowing for highly scalable and flexible distributed applications.
Software-Defined Infrastructure Technical computing infrastructure that is defined entirely in software, so that it operates independently of hardware-specific dependencies and is programmatically extensible.
Wide Area Networking And SD-WAN Technology to connect two or more geographically dispersed networks using physical or virtual means and tools.