research

Results 351 - 375 of 2515Sort Results By: Published Date | Title | Company Name

The adoption of cloud-based services: Increasing confidence through effective security

Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management
    
CA Technologies

Agile Computing: The Time is Right for DevOps

Published By: CA Technologies     Published Date: Jun 27, 2014
In this research report from CA Technologies and IDG, read how many IT leaders are finding help through the DevOps movement: a discipline with the mission to improve IT service delivery agility and quality.
Tags : 
agile computing, devops, idg, enterprise software, performance testing, product lifecycle management, research
    
CA Technologies

What IT Users & Business Users Think About Bring Your Own Identity

Published By: CA Technologies     Published Date: Oct 22, 2014
This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).
Tags : 
byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management, access control, application security
    
CA Technologies

Reclaiming Control of Mobile Development with Devops

Published By: CA Technologies     Published Date: Oct 08, 2014
In this Gigaom Research Webinar, we will examine the impact mobility has had on application development, the pain points experienced when businesses try to manage mobile development across the enterprise, and the role automation, DevOps and other rapid development tools play in moving IT from inhibitor to enabler.
Tags : 
ca technologies, mobile applications, application development, mobile apps, apps, mobile development, devops, mobile computing
    
CA Technologies

DevOps: Enterprise Organizations Newest Best Practices

Published By: CA Technologies     Published Date: Jun 03, 2015
"The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer."
Tags : 
    
CA Technologies

DevOps: Enterprise Organizations Newest Best Practices

Published By: CA Technologies     Published Date: Jun 04, 2015
"The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer.
Tags : 
    
CA Technologies

DevOps: Enterprise Organizations Newest Best Practices

Published By: CA Technologies     Published Date: Jun 04, 2015
The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer.
Tags : 
    
CA Technologies

DevOps: Enterprise Organizations Newest Best Practices

Published By: CA Technologies     Published Date: Jun 04, 2015
The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer.
Tags : 
    
CA Technologies

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

The Forrester Wave™: Application Performance Management, Q3 2016

Published By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
    
CA Technologies

GDPR is a state of mind, not just a technology solution (Computing Research)

Published By: CA Technologies     Published Date: Sep 13, 2017
"As the EU General Data Protection Regulation (GDPR) looms overhead, finding specific answers to these obvious questions, How do I best want to secure my data, and which kind of data? Which milestones along the development journey are most at risk?, you might also begin to ask the right questions about how to solve them, and with that, begin ticking the GDPR box for each and every task at hand. View this Computing Research report to understand why GDPR is a state of mind, not just a technology solution."
Tags : 
    
CA Technologies

INSIDER THREAT 2018 REPORT

Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies

Project and Portfolio management (PPM): Ensuring Confidence In A Time of Uncertainty

Published By: CA Technologies     Published Date: Sep 25, 2017
CA has reevaluated the design methodology behind its PPM tool to deliver an end-user-driven solution that better reflects the goals and motivations of the entire team, helps to ensure project confidence and removes the stress associated with the possibility of project failure. At the core of this new design methodology is our proprietary research, which unquestionably points to the need for an outcome-driven approach to innovation, chiefly concerned with understanding and measuring the customer’s success criteria.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
CA Technologies

Computing Research: GDPR is a state of mind, not just a technology solution

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA

EU General Data Protection Regulation (GDPR) Are you ready for it?

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In this paper, you will find the results of a survey commissioned by CA Technologies to understand the readiness of organizations to meet the compliance needs of the GDPR. Given the GDPR is set to have wide-ranging implications for the type of data that can be used in non-production environments, CA Technologies wanted in particular to understand how companies are planning for the GDPR and what processes and technology is needed to help them.
Tags : 
research scope, gdpr, business, compliance, technological challenges, customer data, investment, pseudonymization
    
CA Technologies EMEA

Bloor Research: CA Technologies Agile Testing Solutions

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Over the last several years CA Technologies has acquired a number of companies and their respective products, to augment its continuous delivery suite and, especially, its DevTest portfolio. In particular, it has recently acquired Grid-Tools and Rally Software. Bloor Research has been asked to explore how Grid Tools’ products – now known as CA Test Data Manager (formerly Datamaker and CA Datafinder) and CA Agile Requirements Designer (formerly Agile Designer) expand and augment the capabilities provided by CA Service Virtualization (previously iTKO’s LISA) and CA Agile Central (formerly Rally), making the whole greater than the sum of the parts.
Tags : 
technology, business value, ict investments, research services, consultancy projects, bloor research, continuous testing, testing effort
    
CA Technologies EMEA

Report: Sponsored Report: 2018 Insider Threats Report

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA

EU-Datenschutz-Grundverordnung (DSGVO) - Sind Sie bereit?

Published By: CA Technologies EMEA     Published Date: May 24, 2018
Dieses White Paper enthält die Ergebnisse einer von CA Technologies in Auftrag gegebenen Studie zur Analyse der Vorbereitungen in Unternehmen im Zusammenhang mit der Erfüllung der Compliance-Anforderungen für die DSGVO. Im Hinblick darauf, dass die DSGVO weitreichende Auswirkungen auf dieDaten hat, die in Umgebungen außerhalb der Produktion verwendet werden, ging es CATechnologies in ersterLinie darum zu verstehen, wie Unternehmen für die DSGVO planen und welcheProzesse und Technologien sie zur Unterstützung benötigen.
Tags : 
research scope, gdpr, business, compliance, technological challenges, customer data, investment, pseudonymization
    
CA Technologies EMEA

The modern PMO provides insightful business intelligence

Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA recently partnered with TechValidate to perform a research study that would help us to understand how organizations are leveraging our CA Project & Portfolio Management (CA PPM) solution to evolve their businesses. The study validated the changing role of the modern PMO.
Tags : 
tech, validate, research, study, portfolio, management
    
CA Technologies EMEA

The Forrester Wave™: Continuous Delivery And Release Automation

Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation

Reducing Cost, Risk, and Errors with IT Process Automation

Published By: CA WA     Published Date: Aug 15, 2008
Despite increasingly complex data center environments, IT is expected to provide business owners with faster service, higher reliability, and greater agility than ever before – all within a tight budget. It is impossible to meet these goals with manual IT processes. However, EMA research shows that IT Process Automation (ITPA) helps achieve these goals, delivering annual savings of $500,000 on staff costs alone, and 64 hours of additional uptime per year – plus improved resource utilization, security and compliance, problem response times, and agility.
Tags : 
workload automation, ca wa, computer associates, automation, bpm, bpa, it management, business process automation
    
CA WA

Bringing Automation to the Data Center

Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management, network architecture, business process automation
    
CA WA 2

Replace AV Buyers Guide

Published By: Carbon Black     Published Date: Oct 10, 2018
According to ESG Research, 65% of organizations believe the skill level of their security team could be improved, and 48% are using more than 25 security products. This leads to more overworked staff and, ultimately, less effective security. Download the Replace AV Buyer's Guide to learn what your team should look for when replacing legacy AV with an endpoint security solution that is easy to manage and deploy, and can cost-effectively protect your growing business. In this buyer's guide you'll find: A core evaluation checklist for replacing AV. Guiding questions to frame your evaluation to replace AV. How to run a test of next-generation AV solutions. Learn more about replacing your traditional AV in the Replace AV Buyer's Guide.
Tags : 
    
Carbon Black

The Definitive Guide to Next-Generation Endpoint Security

Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.