research

Results 2376 - 2400 of 2429Sort Results By: Published Date | Title | Company Name

DCIG 2017-2018 All-flash Array Buyer’s Guide [March 2017]

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise

ESG Infographic - Nimble/Assessing the impact of Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
HPE InfoSight analyzes millions of sensors every second to predict and prevent problems across the infrastructure stack and transform the support experience. Based on ESG research, the benefits to enterprises stemming from HPE InfoSight are both significant and unique.
Tags : 
    
Hewlett Packard Enterprise

Nimble Labs Report: Can machine learning prevent application downtime?

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability "
Tags : 
    
Hewlett Packard Enterprise

Finding Eureka

Published By: Adobe     Published Date: Sep 28, 2016
Marketers shouldn’t work in the dark. The science of online testing shines a light on your marketing, showing you what to optimize throughout the entire customer journey. The new Adobe guide, Finding Eureka, shows you how. Read the guide to learn: - Strategies and best practice approaches to online testing - Incremental steps to improving your online testing - The benefits of different test types including A/B, A/Bn, multivariate, and multichannel
Tags : 
adobe, marketing, marketers, market research
    
Adobe

The Forrester Wave™: Automated Malware Analysis, Q2 2016

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks

When faced with disruptive opportunities, think agile

Published By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : 
business agility, data usage, network infrastructure, information technology
    
Juniper Networks

Is Managed Security Monitoring Right for Your Organization?

Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
    
IBM

TechTarget: Making The Most Of Customer Data

Published By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM

Tech Target Editorial - Solutions Spotlight: How to optimize your MDM strategy

Published By: IBM     Published Date: Apr 18, 2017
Companies in all industries can benefit from a master data management program, advises MDM expert Anne Marie Smith. Learn how to enhance yours.
Tags : 
data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations
    
IBM

The State Of Mobile Application Insecurity - Ponemon Institute Research Report

Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM

The ABCs Of Mobile Device Management

Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM

Gartner: When and How to Go Beyond EMM to Ensure Secure Enterprise Mobility

Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout

Gartner: When and How to Go Beyond EMM to Ensure Secure Enterprise Mobility

Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity, security management, mobile device management
    
Lookout

Market Insights: Mobile Threat Defense and EMM

Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout

What is Enterprise Mobile Security

Published By: Lookout     Published Date: Mar 28, 2017
The data that you’ll see throughout this book is the result of a survey commissioned by Lookout and conducted by Enterprise Strategy Group, an integrated IT research, analyst, strategy, and validation firm.
Tags : 
enterprise, mobile, security, survey, commission, lookout
    
Lookout

Progress included in Gartner Magic Quadrant

Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress

Digital Marketing Maturity: The Results are In

Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress

The Forrester Wave™: Enterprise Health Clouds, Q3 2017

Published By: Progress     Published Date: Mar 26, 2018
In our 37-criteria evaluation of enterprise health cloud providers, we identified the 10 most significant ones — ClearDATA, CloudMine, IBM, Kinvey, Medable, Microsoft, MphRx, NTT DATA, Salesforce, and SAS — and researched, analyzed, and scored them. This report shows how each provider measures up and helps healthcare CIOs make the right choice.
Tags : 
    
Progress

The Ultimate Guide to Managing and Engaging Gen - Z Employees

Published By: HotSchedules     Published Date: Jan 17, 2019
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your generation z employees while keeping your restaurant compliant with today’s labor laws? Research has found generation z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules

Is cloud the way of the content management future? Why many organizations are moving to cloud-based

Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : 
cloud, solutions, ecm, onbase, hyland, data, availability, encryption
    
OnBase by Hyland

Nucleus Research: CPM Technology Value Matrix 2017

Published By: Host Analytics     Published Date: Aug 01, 2017
The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more.
Tags : 
    
Host Analytics

Nucleus Research: CPM Technology Value Matrix 2017

Published By: Host Analytics     Published Date: Aug 02, 2017
"The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more. "
Tags : 
    
Host Analytics

Will Your Company Survive The Next Big Disruption? IT As The Great Enabler

Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks

Accelerate Deep Learning with a Modern Data Platform

Published By: Pure Storage     Published Date: Jul 03, 2019
Financial services businesses face unprecedented market challenges. Disruption from Fintech firms, increased local and international regulation, geo- political upheavals and wavering customer loyalty. The need to fully understand the market, to innovate, to reduce costs and be more competitive has never been greater, and this is where AI can help. According to one fintech research company, by 2030 the financial services sector could reduce operational costs using AI, by as much as 22%. It suggests that will equate to around $1 trillion in efficiencies. So, from a purely operational point of view, doing nothing is not really an option for companies that want to remain competitive. Today, financial services firms across the board need to rejuvenate customer experience to protect against client attrition, and protect those customers against risk. While data analysis and visualization are key to making sense of data, the fundamental challenge for all businesses is building an infrastructur
Tags : 
    
Pure Storage

Computing Research: GDPR is a state of mind, not just a technology solution

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Start   Previous    84 85 86 87 88 89 90 91 92 93 94 95 96 97 98    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.