Prediction Category Definitions

Prophyts Prediction Category Definitions

Prophyts Prediction Categories are unique by design. Our team of industry experts spends countless hours considering the best “Intent” topics to map to a specific prediction category providing a level of efficiency and specificity required for the modern marketer.

Our categories are developed this way to empower marketing and sales teams to quickly leverage curated Intent data as product categories via the Prophyts prediction engine which identifies and monitors priority accounts resulting in more efficient marketing and reduced sales cycles. There is no need to develop a complex model or integrated priority systems. Prophyts is a turnkey solution for what you need today.

If you don’t see your product category on this list, let us know. We can add a custom category for any of your products.

Analytics and Business Intelligence
Advanced Analytics Advanced analytics provides algorithms for complex analysis of either structured or unstructured data. It includes sophisticated statistical models, machine learning, neural networks, text analytics, advanced visualization, and other advanced data mining techniques.
Advanced Analytics Software Software solutions that drive advanced analytics.
Performance Management and Dashboards Tools and techniques for ensuring optimal organizational performance through preparation and use of visual representations of key performance indicators.
Predictive Analytics: Predictive modeling/Machine learning/Neural networks Statistical and mathematical algorithms and techniques which can be used on both structured and unstructured data (together or individually) to determine the probability of future outcomes based on historical data
Prescriptive Analytics Analytics that examines data to suggest actions an enterprise take in response to trends or to avoid future problems.
Visual Analytics Technologies that discover and display the results of data analysis; tools may be display only or allow user to manipulate data to ask "what-if" questions or drill down deeper into specific results. Newer tools automate the discovery of insights.
 
Availability/Backup/Storage
Automated Storage Tiering Software Automatically moves data to different types of storage devices and media to optimize performance, capacity and cost.
Availability and Clustering Software Virtualizes system services of physical or virtual servers so they appear as a single resource.
Data Protection and Recovery Software or services for protecting, restoring and recovering data in case of errors or incidents.
Email Archiving Software
Policy-based tools that integrate with email systems to save messages to a secondary archive.
Flash Storage The use of flash memory for long-term storage.
Host or Hypervisor-Based Replication Software Tools for creating and maintaining backup virtual machines.
Replication Management Software
Solutions for creating and managing real-time backups of production data and databases.
Storage Acceleration Software Software for improving the performance of storage systems.
Storage and Device Management Software Solutions for managing storage and other devices.
 
Data Center
Business Process Automation Increasing productivity by automating important business processes.
Cloud Networking Use of networking resources on demand from a cloud provider.
Datacenter Operations Automation Increasing speed, efficiency and effectiveness of datacenter management through automation.
Host-Based File Systems and Volume Management Software
Tools for improving the performance of file systems and disk volume management.
IT Event and Log Management Tools Tools for managing large quantities and volumes of computer logs.
Network Application Delivery Software Technologies designed to ensure availability, security, visibility and speed for critical applications.
Network Management Software Tools for managing computer networks.
Network Monitoring and Reporting
Systems that constantly monitor computer networks and automatically notify administrators of issues.
Performance Management Software
Tools for managing the performance of a datacenter.
Power Management Software and hardware to manage power supplies for reliability, cost efficiency and redundancy.
Private Cloud Computing resources modeled after the scalability and self-service of public cloud computing but with infrastructure maintained by the customer, often on-premise, or by a third-party service provider, for added security and customization.
Software and IT Asset Management Processes and tools for managing the full lifecycle of software and hardware, from purchase to disposal.
System and Data Migration Software Tools to help organizations move systems and data from one platform to another platform, including software version upgrades, migrations to the cloud and moves between competing platforms.
Unified Communications Platforms integrating enterprise communication services such as email, instant messaging, presence information, voice, conferencing, screen sharing, data sharing and other services.
Workload Management Software for scheduling, initiating, running and managing tasks.
 
Data Management
Big Data
Data characterized by its large volume, variety (diversity), and speed of creation and processing (velocity). Big data may be structured or unstructured.
Data Governance Solutions Software and hardware products along with policies and practices that help an enterprise meet industry and government regulations and compliance related to data use, availability, storage, security, integrity, and management.
Data Integration Practices, practices, and tools for combining and unifying two or more disparate data sources from one or more locations internal or external to an enterprise
Data Preparation
Techniques and processes for improving on data quality and completeness, standardizing data, collecting and consolidating it, and transforming it for reporting and analytics.
Data Quality Techniques to measure and ensure consistent, complete, accurate, and trustworthy data.
Data Security
Data security consists of all of the processes that protect data from unauthorized access, corruption, and usage, as well as upholding privacy policies throughout its lifecycle in the analytics environment.
Data Warehousing Solutions
Software and hardware solutions that focus on Data platforms are where data is ingested and persisted to be provisioned for a wide range of applications and operations
ETL solutions Software that focuses on the extraction, transformation, and loading of complete or partial data from a source to a different destination for data integration, reporting, or data quality purposes.
Metadata Management Creation and management of data about data (definition, value limits, origin, restrictions) that ensures data consistency and integration across an enterprise.
Modern Data Management Architectures Technologies that handle today's more demanding data characteristics -- including real-time processing to business intelligence in the cloud -- to satisfy organizations -- demands for new data types, subjects, sources, and targets for both operational and analytics use cases.
Open Source
Solutions in which the source code is made available to all without restriction and which is typically modified and redistributed within a community of users.
 
Developer
.NET Development
Everything to do with developing for Microsoft's .NET development framework, including the new open source .NET Core framework.
Agile Development
Approaching software development in a collaborative manner with ongoing and constant updates and improvements, as guided by the principles outlined in the agile manifesto.
AI/Machine Learning Algorithms and approaches to data as they relate to artificial intelligence and machine learning projects, no matter the language or platform used.
API Development and Management The code that connects enterprise programs and makes modern development possible.
Application Lifecycle Management (ALM)
The process surrounding the design, development and testing of an software application, including ongoing processes such as QA and continuous testing.
Application Performance and Monitoring/Management Monitoring application performance (generally in real-time) and the tools for improving it.
Application/Data Security
Tools and approaches to securing applications and code created by enterprise developers.
Big Data Development Everything related to big data development, from architecture to data structures to tools to common languages.
Change/Configuration Management Controlling and documenting changes withing programs and making sure that configurations are managed and optimized (and possibly automated).
Cloud Development Development that touches the cloud in any capacity (vs. locally), often in the form of IaaS and SaaS services.
Database Development & Data Tools Everything to do with how you store and use your data.
IoT Development When developing for data that's not stored on a traditional computing device, that's IoT -- whether commercial, enterprise or industrial, or stored on the cloud or on the edge.
Mobile Development Programming apps and tools used on the wide variety of mobile devices available to enterprise users.
Open Source Development
The wide variety of IDEs, databases, tools and other resources open to all and not restricted by a specific vendor's usage requirements.
Software Testing Everything to do with software testing, from quality assurance to continuous testing to automated testing.
SQL Server Microsoft's premier database, often used with .NET installations.
Web Development From HTML, CSS, JavaScript, Angular, covering both the front-end and back-end of Web-related enterprise development.
 
Emerging Tech
Artificial Intelligence - Chatbots Tools and technologies for using or creating programs capable of engaging in conversations with people for marketing or customer support.
Artificial Intelligence - Customer Services Advanced technologies for improving customer service through the use of chatbots and other artificial intelligence.
Artificial Intelligence - Machine Learning Tools and trends involving the use of algorithms against large data sets to find patterns and other connections and make predictions.
Blockchain Platform A distributed database ledger technology that continuously grow with an immutable ledge for recording the history of transactions.
Digital Transformation Making business processes significantly better through the use of digital technology, especially involving Big Data, Artificial Intelligence and the Internet of Things.
High Performance Computing Systems, applications and software for processing data and performing complex calculations at high speed.
 
IT Management
Advanced Authentication User authentication tools providing additional security measures beyond username and password, such as multi-factor authentication (MFA), two-factor authentication (2FA) and single sign on (SSO).
Identity and Access Management
Security tools to ensure that only authorized users can access and use the resources they are entitled to.
 
Security
Application Security Protecting applications from external threats using software, services, hardware and procedures.
Cloud Security Technologies and policies for defending cloud systems and data.
Data Breach Response Requirements, procedures, services and tools for reacting to a loss of data.
DDoS Attack Monitoring Technologies to defend against distributed denial-of-service attacks.
Endpoint Security
Securing the corporate network for access from remote devices.
Firewall Security Protecting the network through packet filtering and monitoring.
Fraud Detection And Prevention Techniques and services for blocking or mitigating illegal activity.
Hybrid Cloud Security Protecting cloud computing environments that consist of a mix of on-premises, private cloud and public-cloud services.
Messaging Security Methods and tools for defending email from viruses, spam, phishing and other attacks.
Mobile Security Tools and techniques for securely managing mobile devices.
Network Security Methods and tools for defending computer networks against attacks.
Ransomware Malware that uses encryption to lock computer systems and data, unlocking them in exchange for a ransom payment.
Secure File Sharing
Systems for storing and exchanging files remotely using encryption.
Security and Vulnerability Management Software Periodic identification, classification, remediation and mitigation of software vulnerabilities.
Security Information And Event Management Products and services that bring together security information management with security event management.
Web Security Tools and techniques for securing websites, web applications and web services.
 
Virtualization and Cloud
Cloud Storage Data storage on remote servers that can be accessed over the Internet.
Containers Virtual images of applications that run inside an operating system, allowing for highly scalable and flexible distributed applications.
Network Functions Appliances Virtualization Solutions for running network functions in virtual machines on hardware appliances designed to optimize networking performance.
Software-Defined Infrastructure Technical computing infrastructure that is defined entirely in software, so that it operates independently of hardware-specific dependencies and is programmatically extensible.
Wide Area Networking And SD-WAN Technology to connect two or more geographically dispersed networks using physical or virtual means and tools.