purpose

Results 151 - 175 of 402Sort Results By: Published Date | Title | Company Name

Gartner Magic Quadrant for Identity and Access Management as a Service

Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta

Gartner Magic Quadrant for Security Information & Event Management (SIEM) 2017

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119

Gartner: Maximize the Business Value of your Data Lake with a Smart Data Catalog

Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners

Get ahead of FDA Quality by Design requirements with purpose built Validation Automation software.

Published By: Compliance Associates     Published Date: Jun 29, 2015
Are you feeling the pressure to meet FDA guidelines on Quality by Design (QbD) principals for Process Validation? Existing manufacturing, LIMS, ERP and document management tools are lacking integration and on demand view of your processes. They have hidden costs, risks and create delays to scalable product manufacturing and revenue. Since the FDA is demanding scientific arguments to support process and product development activies and a lifecyle approach, consider the value of a purpose built app for Process Validation. This new class of APP will bring your products to market faster and lower the risk of costly delays. Download the Primer to learn more.
Tags : 
regulatory compliance services, validation services, regulatory compliance, fda rulings, validator, validation, validation consultants
    
Compliance Associates

Get the 2013 Gartner Magic Quadrant for General-Purpose Disk Arrays

Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage

Gigamon Whitepaper: Security at the Speed of Your Network

Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon

Global Insights on Document Security

Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity, project management, cloud computing
    
Adobe

Global Insights on Document Security

Published By: Adobe     Published Date: Aug 11, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, enterprise, mobile, security, saas, document management, cloud, business technology
    
Adobe

Going Beyond Email Compliance: 7 Surprising Use Cases for Email Suppression

Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
    
UnsubCentral

Got CRM? Small Business CRM Software Guide

Published By: Surado Solutions, Inc.     Published Date: Jan 29, 2007
The purpose of this whitepaper is to educate small business owners on what, why and how CRM can retain existing customers and help their business grow.
Tags : 
enterprise applications, customer relationship management, customer service, crm, crm software, surado
    
Surado Solutions, Inc.

Grow your business with a scalable network

Published By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, robust, scalable, byod, networking, knowledge management
    
HP

Guidelines for the Evaluation of Enterprise De-Duplication Solutions

Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage, data management, data deduplication
    
Diligent Technologies

Hadoop-Enabled Analytics: Don't Ignore the Elephant in the Room

Published By: IBM     Published Date: Jul 06, 2017
Known by its iconic yellow elephant, Apache Hadoop is purpose-built to help companies manage and extract insight from complex and diverse data environments. The scalability and flexibility of Hadoop might be appealing to the typical CIO but Aberdeen's research shows a variety of enticing business-friendly benefits.
Tags : 
data management, yellow elephant, business benefits, information management
    
IBM

Halving Downtime Costs for Mission Critical Apps

Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle

HD Advertising Trends Report Q3

Published By: Extreme Reach     Published Date: Nov 04, 2010
The purpose of this report is to provide specific HD adoption details, by advertisers and broadcasters to help inform advertising practices.
Tags : 
hdtv, advertising distribution, hd usage, ad delivery
    
Extreme Reach

Healthcare Regulatory Compliance Services - Adopting new regulatory standards in the US Healthcare

Published By: GSS Infotech     Published Date: Nov 11, 2010
The purpose of this paper is to provide a clear understanding of HIPAA and ICD migration, analyze the benefits beyond ICD remediation by providing regulation insights, and discuss the impact of the new regulations on systems,
Tags : 
healthcare, healthcare regulation, icd 10, icd challenges, icd transition, hipaa, hipaa 5010 migration, e-learning tool, testing services, icd 10 testing, icd codes, icd coding guidelines, icd classification, icd training, icd certification, icd 10 implementation, icd 9-10, hipaa certification, hipaa training, hipaa compliance
    
GSS Infotech

Helping Managers Take Action on Survey Results

Published By: Engage2Excel     Published Date: Feb 11, 2019
Our purpose here is not to provide a step-by-step guide, but to provide organizations with a framework for how to think about survey follow-up and action planning.
Tags : 
    
Engage2Excel

Highlights for Children

Published By: Cherwell Software     Published Date: Apr 07, 2016
Highlights for Children, Inc. was founded in 1946 with the belief “that children are the world’s most important people.” Since its inception, the organization has been dedicated to helping children “become their best selves and become confident, caring, curious, and creative individuals.” Today, the Highlights for Children, Inc., family of companies includes educational publishers who publish textbooks and offer educational seminars for teachers, as well as a consumer division that publishes books, digital products, and four magazines for children ages 0-12. The flagship magazine is Highlights for Children, well known for its Fun with a Purpose.
Tags : 
best practices, customer support, business intelligence, business optimization, business management
    
Cherwell Software

How CA Cloud Service Management Speeds Deployment and Time to Value

Published By: CA Technologies     Published Date: Feb 13, 2015
For years, many support teams have been hamstrung by their traditional service desk platforms, which require complex, time-consuming coding for virtually every aspect of customization. This complexity makes it costly and difficult for support organizations to adapt—and places an increasingly substantial burden on the agility and efficiency of the business as a whole. CA Cloud Service Management is a clearly differentiated alternative to traditional service desk platforms. CA Cloud Service Management is purpose built for speed—rapidly accelerating time-to-value where other SaaS solutions fall short. Implement in days, adopt with minimal training, configure without programmers, automate end-user requests, and get automatic upgrades.
Tags : 
service management, deployment, time to value, cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
CA Technologies

How Ruggedness Reduces TCO for Mobile Computers

Published By: Intermec     Published Date: Jun 16, 2009
General-purpose PDAs and ruggedized enterprise mobile computers serve different markets and functions, and also vary by size, weight and materials. But the biggest difference is their total cost of ownership (TCO).
Tags : 
tco, total cost of onwership, pda, enterprise mobile computers, vdc, mobile devices, productivity, power management, device management, mobile computing, mobile data systems, total cost of ownership
    
Intermec

How Technology is Transforming the Financial Services Industry

Published By: Workday     Published Date: Sep 19, 2018
The data deluge problem isn’t just about the amount of internal, operational data being stored, but also the level of granularity available. The finance and HR teams of many institutions still operate on outdated systems that are only able to store aggregate data with complex details summarized. While these systems may be sufficient for the purpose of financial reporting, they’re unable to keep up with the level of complexity needed to drive business decisions.
Tags : 
    
Workday

How To Build a SOC With Limited Resources

Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm

How to Create HTML for Modern Email Clients: a Guide for Designers and Marketers

Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS

How to Fix the Data Loss Problem

Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile

How To Gain Visibility Across Your Multi-Cloud Environment

Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.