ibm

Results 26 - 50 of 4401Sort Results By: Published Date | Title | Company Name

11 Key Marketing Trends for 2011

Published By: IBM Unica     Published Date: Sep 08, 2011
The proliferation of marketing channels, and the explosion of data, pose a wealth of challenges for marketers making crucial calls for 2011. The results of Unica's annual survey of marketers reveal 11 key trends in marketing for 2011.
Tags : 
ibm, unica, marketing trends, annual survey, social media trends, cross-channel attribution, mobile application
    
IBM Unica

12 reasons you don't need to monitor your application

Published By: IBM     Published Date: Jun 28, 2016
Availability, performance, user interface... Nobody cares. The age of the enterprise is here! Customers are now automatically purchasing any product you release, ensuring the longevity of your enterprise.
Tags : 
best practices, competitive advantage, enterprise, productivity, software outsourcing, database development
    
IBM

12 Reasons you Don't Need to Monitor Your Apps

Published By: IBM     Published Date: Apr 15, 2015
Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says!
Tags : 
applications, monitoring, ibm, analytics, business intelligence, application performance management, application integration, analytical applications, virtualization, cloud computing
    
IBM

168% ROI from your Collaboration investment? Yes, it IS possible with IBM Connections!

Published By: IBM     Published Date: Dec 11, 2015
Social Technologies have the potential to transform businesses. By enabling new levels of speed and agility, they can drive innovation and shift the dynamics of how people interact with each other.
Tags : 
enterprise applications, business technology, telecom
    
IBM

20 Mobile Tips for Holiday Marketing Success

Published By: IBM Marketing Cloud     Published Date: Sep 26, 2016
Download this paper and discover 20 tips you can use to better engage on-the-go customers, improve the mobile experience across the entire customer journey, and ultimately increase holiday conversions.
Tags : 
marketing, mobile marketing, customer, customer experience, customer relationship, ecommerce, mobile computing, mobile data systems, customer interaction service, customer relationship management, customer service
    
IBM Marketing Cloud

2012 Global Reputational Risk and IT Study

Published By: IBM     Published Date: Oct 09, 2012
Insights from the 2012 Global Reputational Risk and IT Study: How security, business continuity and technical support can shape the reputation and value of your company.
Tags : 
security risks, it security, reputational risk, business continuity, infographic, ibm, security, business technology
    
IBM

2014 Cost of Data Breach Study, From Ponemon Institute, sponsored by IBM

Published By: IBM     Published Date: Jan 09, 2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.
Tags : 
data breaches, data breach detection, business continuity management, malware, security, knowledge management, data management, business analytics, business intelligence
    
IBM

2014 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Jul 31, 2015
Selecting MSS providers.
Tags : 
mss, security, management, network security appliance, infrastructure, infrastructure management
    
IBM

2014 Gartner Magic Quadrant for Enterprise Mobility Management Suites

Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod, emm solution, mobility, it management, enterprise applications
    
IBM MaaS360

2014 Gartner Magic Quadrant for Integrated Marketing Management

Published By: Teradata     Published Date: Feb 04, 2015
Optimize your customer experience with Teradata Integrated Marketing Cloud Teradata is recognized for vision, innovation and broad set of marketing capabilities. The 2014 Gartner Magic Quadrant for Integrated Marketing Management is an invaluable resource with insights that can help you execute your marketing initiatives.
Tags : 
teradata, integrated, marketing, vendors, executional, operational, analytical, campaign, management, resources, research, oracle, infor, microsoft, direxxis, sdl, repoint global, adobe, market, sap
    
Teradata

2014 IBM X-Force Threat Intelligence Report 4Q 2014

Published By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : 
security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, knowledge management, enterprise applications
    
IBM

2015 Cost of Data Breach Study: Global Analysis

Published By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : 
data, cost global, security, hacker detection, business intelligence, data protection, database security
    
IBM

2015 Cost of Data Breach Study: Global Analysis

Published By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, ponemon institute, jp morgan, global analysis, networking, security, software development, it management, knowledge management, enterprise applications, data management, business technology, research
    
IBM

2015 Cost of Data Breach Study: Global Analysis

Published By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, analysis, ponemon institute, networking, security, business technology
    
IBM

2015 Cost of Data Breach Study: Global Analysis

Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, global, ponemon institute, knowledge management, enterprise applications, network security, data loss prevention
    
IBM

2015 Cost of Data Breach Study: United States

Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : 
ibm, data breach, united states, ponemon institute, knowledge management, enterprise applications, network security, data loss prevention
    
IBM

2015 Cyber Security Intelligence Index

Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index, security, research
    
IBM

2015 Cyber Security Intelligence Index

Published By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, threat, data, security
    
IBM

2015 Cyber Security Intelligence Index

Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, security, enterprise applications, business technology
    
IBM

2015 Cyber Security Intelligence Index

Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management, network security
    
IBM

2015 Cyber Security Intelligence Index for Retail

Published By: IBM     Published Date: Jan 12, 2016
Analysis of cyber attack and incident data for the Retail industry from IBM's worldwide security services operations.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM

2015 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Jan 07, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Tags : 
ibm, gartner, magic quadrant, security, enterprise
    
IBM

2015 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Jan 15, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, gartner, security, managed security services, magic quadrant, enterprise applications, business technology
    
IBM

2015 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, knowledge management, enterprise applications, business technology
    
IBM

2015 Gartner Magic Quadrant for Client Management Tools

Published By: IBM     Published Date: Oct 02, 2015
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
client management, ibm, bigfix, gartner magic quadrant, cmt, business management, customer interaction service, customer relationship management, project management, service management, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.