analyst

Results 1 - 25 of 729Sort Results By: Published Date | Title | Company Name

IDC on Intelligent ERP: A Game Changer in the Digital Age?

Published By: SAP EMEA Global     Published Date: Aug 23, 2019
Hear from IDC analyst Mickey North Rizza and an SAP's Neil Krefsky as they discuss what intelligent ERP is, how it will impact your business, and how to get started. We will cover how an intelligent ERP will help to to: Reduce complexity within your enterprise Speed up decision making and time to value Bring machine learning to the finance function
Tags : 
    
SAP EMEA Global

Is Noise Pollution Making Your Data Less Secure?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd

The Algorithmic Insurer - How AI and Machine Learning is Transforming the Insurance Industry

Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software

Osterman Research: Ten Questions to Ask About Your Office 365 Deployment

Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast

6 Ways to Save with VMC on AWS

Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartner’s 2017 prediction that “through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches”. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS don’t experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
    
CloudHealth by VMware

IBM Resilient SOAR Platform and IBM QRadar Security Intelligence Solution Brief

Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload. By integrating the IBM Resilient SOAR Platform with IBM QRadar® Security Intelligence, security teams can build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases.
Tags : 
    
Group M_IBM Q4'19

Ovum Analyst Whitepaper Hybrid Integration Platforms

Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Analyst whitepaper by Ovum: Hybrid IntegrationPlatforms: Digital Business Calls for Integration Modernization and Greater Agility - Exploring the factors driving hybrid integration platform adoption
Tags : 
    
Group M_IBM Q4'19

ESG Webinar Moving Beyond EDR to XDR

Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro

Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud

Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro

Why Server Hardware Matters: Recent Survey Evaluates Server Adoption and Market Misperceptions

Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC

SAS® in the Open Ecosystem

Published By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
    
SAS

Inteligência conectada nos melhores bancos do mundo

Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo estão apostando muito em inteligência artificial e machine learning para lhes dar a vantagem tecnológica necessária para obter serviços bancários em tempo real, personalizados e preditivos. Um marco ajudará a diferenciar os primeiros ganhadores e fornecerá vantagens contínuas em inteligência. Faça o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo estão se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que você conhecerá: • 8 tendências que refletem o nível de preparação do banco para a inteligência conectada • 9 armadilhas para evitar e 9 maneiras de pular os obstáculos • Os elementos básicos pessoais, preditivos e em tempo real da IA e ML para os bancos • Líderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso • Orientação essencial do IDC para os bancos líderes
Tags : 
    
TIBCO Software

Inteligencia conectada en los mejores bancos del mundo

Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo están apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnológica que necesitan para ofrecer servicios bancarios más personalizados, predictivos y en tiempo real. Un marco ayudará a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitirá conocer cómo los mejores bancos del mundo se están volviendo más personales, más predictivos, y más en tiempo real que nunca. Lo que usted conocerá: • Las ocho tendencias que reflejan el nivel de preparación de los bancos para la inteligencia conectada • Los nueve obstáculos que evitar y las nueve formas de salvar las brechas • Los elementos básicos personales, predictivos y de tiempo real de la IA y el ML para los bancos • Los líderes destacados de acuerdo con la investigación de IDC Financial Insights y sus respectivos casos de uso • Una guía esencial de IDC para los bancos líderes
Tags : 
    
TIBCO Software

Finding Flexibility with Microservices, Containers, and Runtimes

Published By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was — one way or another — getting into “the cloud.” There’s been a shift in customers’ pri
Tags : 
    
Red Hat

The Future of Performance Evaluation

Published By: CFA Institute     Published Date: Oct 07, 2019
Performance evaluation is coming of age. Once a narrow, back office role focused solely on crunching returns, it has become ever more integrated into the DNA of investment firms. Both internally and externally, performance evaluation adds value, helping senior management make key judgement calls where the difference between the right solution and the wrong solution is the difference between growth or decline. The performance analyst of the future will provide valuable input into nearly every area of an investment firm. What began as a mathematical task—calculating investment returns—is morphing into something much broader. The objective of performance evaluation today is determining what is behind the return being analyzed. What were the key drivers—allocation or selection? What risk was taken to achieve the return? Was it skill, or was it luck, that produced the return?
Tags : 
    
CFA Institute

Evaluating Cloud-based Mobile Device Management

Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data protection, data quality
    
Virtela Communications, Inc.

Making AI Routine, Repeatable and Reliable

Published By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom

Secure at the Source

Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company

Simplifying Data Connectivity in a Data-Driven Enterprise

Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude

Executive Dashboards: Optimizing IT Services to Empower Your Business by EMA

Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo, side bar, application performance management, business integration, business intelligence, business management, business process automation, enterprise resource planning, enterprise software, workforce management
    
ASG Software Solutions

From Bro to Zeek: Making Sense of Network Traffic for Security

Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom

Analytics and Data Sources: Mere Connectivity is Just the Beginning

Published By: Gigaom     Published Date: Oct 24, 2019
A huge array of BI, analytics, data prep and machine learning platforms exist in the market, and each of those may have a variety of connectors to different databases, file systems and applications, both on-premises and in the cloud. But in today’s world of myriad data sources, simple connectivity is just table stakes. What’s essential is a data access strategy that accounts for the variety of data sources out there, including relational and NoSQL databases, file formats across storage systems — even enterprise SaaS applications — and can make them all consumable by tools and applications built for tabular data. In today’s data-driven business environment, fitting omni-structured data and disparate applications into a consistent data API makes comprehensive integration, and insights, achievable. Want to learn more and map out your data access strategy? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guests, Eric
Tags : 
    
Gigaom

A Financial Professionals unique guide to "Supplier Information Management"

Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, configuration management, database development, web service management
    
Zynapse

Improving Procurement Efficiency by "Supplier Information Management"

Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance, mdm, master data management, odm, mmdm, material, eprocurement, business intelligence, database development, data integration
    
Zynapse

Eine Milliarde mobiler Websites – doch kaum ein Grund zur Freud

Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungen sind wertvolle Tools für Unternehmen aller Größen. Sie ermöglichen Kunden die Kommunikation mit Kunden, Interessenten, Mitarbeitern, Partnern und anderen IT-Systemen. Webanwendungen sind naturgemäß offen, interaktiv und stets zugänglich. In ihrem Bericht beleuchten die Analysten von Frost & Sullivan, welche Anbieter von Web Application Firewalls (WAF) es gibt, wie die aktuelle Bedrohungslage für Webanwendungen aussieht und wie die Anbieter diesen Bedrohungen durch Skalierung entgegentreten.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.