purpose

Results 226 - 250 of 396Sort Results By: Published Date | Title | Company Name

Global Insights on Document Security

Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity, project management, cloud computing
    
Adobe

The Custom Defense: Detect, Analyze, and Respond to Targeted Attacks

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
    
CDW-Trend Micro

Customer Activation - Marketing With A Measurable Purpose

Published By: Marketo     Published Date: Mar 23, 2015
As a marketing leader you know that each customer experiences numerous touch points with your company throughout their lifecycle. And it’s the job of marketing to ensure that each interaction has a positive impact and moves the customer on to the next stage. But how can you measure the success of your combined efforts and their impact on your customer’s lifecycle? Download our Customer Activation—Marketing With A Measurable Purpose ebook to learn more.
Tags : 
marketo, customer activation, customer experience, customer engagement, marketing, customer lifecycle
    
Marketo

Forrester TEI Study: Economic Impact of Lync Enterprise Voice and Polycom Working Together

Published By: Polycom     Published Date: Mar 13, 2015
In the fall of 2013, Polycom and Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Polycom voice solutions for Microsoft Lync within their organizations.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality, enterprise applications, data management
    
Polycom

Driving Product Quality With Continuous Verification and Validation

Published By: IBM     Published Date: Mar 10, 2015
This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.
Tags : 
ibm, product quality, continuous engineering, continuous verification, embedded software, it management, knowledge management, enterprise applications
    
IBM

10 MINUTE GUIDE: SAM and The Software Catalog

Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, collaboration
    
CDW

The Distribution Challenge: Are you asking enough from your ERP?

Published By: Epicor Software     Published Date: Feb 26, 2015
The 2014 Mint Jutras ERP Solution Study collected more than 800 qualified responses. The purpose of this study was to investigate ERP goals, challenges and status and also to benchmark performance of ERP implementations.
Tags : 
distribution challenges, erp, erp goals, erp implementations, wholesale distributor, it management, knowledge management, enterprise applications
    
Epicor Software

Gartner Magic Quadrant for Identity and Access Management as a Service

Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta

Who has been Positioned in the Gartner's Leaders Quadrant for SIEM?

Published By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : 
gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information, event management, application security, security management, security policies, data protection, database security, infrastructure, data loss prevention
    
Intel Security

Security for the Mobile First Era

Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron

Clutch Group: XtremIO All-Flash Array redefines paradigms in the legal services marketplace

Published By: EMC Corporation     Published Date: Feb 13, 2015
Clutch Group provides litigation, compliance, and legal services to major Fortune 500 companies in sectors with large legal exposure (Finance, Life Sciences, Natural Resources, etc.). By using purpose-built technology solutions to extract deep insights from large data volumes, the company transformed its business approach of helping client firms make better legal decisions.
Tags : 
all-flash-array, purpose-built technology, large data volumes, business approach, legal decisions, data management
    
EMC Corporation

How CA Cloud Service Management Speeds Deployment and Time to Value

Published By: CA Technologies     Published Date: Feb 13, 2015
For years, many support teams have been hamstrung by their traditional service desk platforms, which require complex, time-consuming coding for virtually every aspect of customization. This complexity makes it costly and difficult for support organizations to adapt—and places an increasingly substantial burden on the agility and efficiency of the business as a whole. CA Cloud Service Management is a clearly differentiated alternative to traditional service desk platforms. CA Cloud Service Management is purpose built for speed—rapidly accelerating time-to-value where other SaaS solutions fall short. Implement in days, adopt with minimal training, configure without programmers, automate end-user requests, and get automatic upgrades.
Tags : 
service management, deployment, time to value, cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
CA Technologies

The Total Economic Impact™ of HP 3PAR StoreServ 7450 All-Flash Storage

Published By: HP     Published Date: Feb 11, 2015
HP commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying 3PAR StoreServ 7450 All-flash Storage. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the 3PAR StoreServ 7450 All-flash Storage (7450) on their organizations. Read this whitepaper to learn more.
Tags : 
    
HP

Content Strategy: The Key to Learning Content That Will Improve Performance and Meet Business Goals

Published By: Tribridge     Published Date: Feb 09, 2015
Delivering great content is often the biggest stumbling block to effective learning in many organizations. A sensible content strategy can help any organization jump-start, rebuild, or enhance its learning initiatives.
Tags : 
content development, training content, e-learning content development, content creation services, content conversion, enterprise content management, custom content, learning content, content optimization, content integration, content development services, enterprise content management system, content authoring software, content authoring tools, off the shelf content, e-learning content, repurposed content, content migration, content services, learning management content
    
Tribridge

The Total Economic Impact™ of HP 3PAR StoreServ 7450 All-Flash Storage

Published By: HP     Published Date: Feb 02, 2015
HP commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying 3PAR StoreServ 7450 All-flash Storage. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the 3PAR StoreServ 7450 All-flash Storage (7450) on their organizations. Read this whitepaper to learn more.
Tags : 
    
HP

Eight Central Management Features to Ensure Network Survival

Published By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
Intel Security

FlexPod Data Center with Microsoft Fast Track Private Cloud 3.0 Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

CenturyLink Hyperscale Testing: Final Engagement Report

Published By: CenturyLink     Published Date: Jan 02, 2015
This report summarizes testing of CenturyLink Cloud Hyperscale compute instances in April 2014. Compute instances from Amazon Elastic Compute Cloud (EC2), Rackspace Cloud, as well as non-Hyperscale CenturyLink Cloud instances were included in testing for comparison purposes. CenturyLink engaged CloudHarmony to conduct this testing and provide independent performance analysis and comparisons of these services. This report summarizes the results of this testing.
Tags : 
centurylink, hyperscale testing, cloud, amazon elastic compute cloud, rackspace cloud, cloudharmony, it management, data center
    
CenturyLink

Changing the Customer Loyalty Program Conversation

Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
The current loyalty program environment is challenging but rife with opportunity. Many poorly designed programs are driving loyalty fatigue and mercenary loyalty. However, there are more loyalty memberships than ever before and those companies that are successful in driving engagement and true loyalty are experiencing significant returns. The programs that “get it right” and earn genuine loyalty don’t just repurpose an old tactical model or copy the competition – they are unique and create or reinforce differentiation in the marketplace. Learn how to design a loyalty program that focuses on the entire lifecycle of a customer.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty, customer incentive programs, customer loyalty program, customer marketing, best practices, customer interaction service, customer relationship management, customer satisfaction, customer service
    
BI WORLDWIDE

Overcome The Challenges of Vendor Invoice Processing

Published By: Esker     Published Date: Dec 08, 2014
In today’s increasingly high-tech and efficiency driven business landscape, internal processes such as accounts payable (AP) are being looked to as prime candidates for modernization. Traditional, paper-based methods of vendor invoice processing are associated with higher costs, lower visibility and longer processing times — all barriers that ultimately impede business progress and the ability to gain a competitive advantage. The purpose of this white paper is to explore the specific challenges faced by companies using manual processing methods while shedding light on the key features and proven benefits of automation. Is it time to modernize your AP process? Read this white paper to get started!
Tags : 
automation, operations, accounts payable, manual inefficiencies, ap workflow, cost, erp system, data recognition, applications, invoice processing, integration, enterprise applications, electronics
    
Esker

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, database security, data loss prevention
    
Symantec

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security, virtualization, data loss prevention
    
Symantec

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, database security, data loss prevention
    
Symantec

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
Symantec

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery, security policies, database security, data loss prevention
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.