Skip to main content
 

analysis

Results 1026 - 1050 of 1283Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 05, 2013
Research and analysis shows that 57 percent of B2B buying steps are completed before a buyer even connects with a salesperson. The role that the sales organization plays in B2B buying cycles has become even more critical. Consistency is necessary through every customer touch point and forms the basis for great customer experiences. In this executive strategy brief, we will explore customer experiences throughout the selling process, how sales must adapt in the age of the customer, and ways to improve sales performance that will positively impact the customer experience.
Tags : 
b2b, sales, customer service, customer experience, business to business, integrated communications, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2014
An analysis on the Facebook Graph Search and the 3 objectives that Facebook should undertake.
Tags : 
facebook, social media, graph search
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security
    
Centrify
Published By: Oracle     Published Date: Jan 07, 2014
A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
Tags : 
socially enabled enterprise, social business, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience, facebook marketing, customer insight
    
Oracle
Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics
    
Cisco
Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security
    
Kaspersky
Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization, cloud, cloud computing
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
The true litmus test of a valuable network analysis tool is its ability to provide information, quickly and easily. Riverbed Cascade® Pilot does this and so much more!
Tags : 
cascade, network analyst, valuable, information, quickly, easily, proactivity
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
ESG was engaged by Riverbed to develop a detailed EVV analysis designed to help IT organizations determine the relative costs and benefits of deploying Riverbed Cascade compared with a typical performance management solution.
Tags : 
economic value, validation, performance, management, esg
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : 
big data analysis, it analytics, manage, complex, automation, monitoring, management strategy
    
Riverbed
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: HP     Published Date: Jun 03, 2014
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication
    
HP
Published By: HP     Published Date: Aug 08, 2014
When you have voluminous data sets growing at an unabated rate, in formats that are unique and complex, how do you address your backup and recovery needs? While relying on traditional backup and recovery solutions can complicate matters, a better approach is to use a solution that enables your IT organization to make decisions that are more intelligent by integrating predictive analysis and an adaptive approach to backup and recovery.
Tags : 
transform, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Analysis of the SIEM market.
Tags : 
analysis, competitors, visionary, market, report
    
AlienVault
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security
    
Palo Alto Networks
Published By: Sirius Computer Solutions, Inc.     Published Date: Jul 08, 2014
In today’s data-driven culture, tools for business analysis are quickly evolving. Clients need a solution to accelerate their business analytics and reporting capabilities while lowering OP-Ecosts associated with systems management and cost of ownership. Download to learn more!
Tags : 
sirius computer solutions, ibm, systems solution, sap business suite, sap hana, data, system management
    
Sirius Computer Solutions, Inc.
Published By: Sirius Computer Solutions, Inc.     Published Date: Jul 08, 2014
In this Research Report, Clabby Analytics takes a closer look at IBM’s new NeXtScale system design. Download to learn more!
Tags : 
sirius computer solutions, ibm, nextscale system, hpc, cloud, grid, data analysis, customer relationship management
    
Sirius Computer Solutions, Inc.
Published By: Riverbed     Published Date: Sep 05, 2014
The true litmus test of a valuable network analysis tool is its ability to provide information, quickly and easily. Riverbed Cascade® Pilot does this and so much more!To use a well-worn cliché, Time is Money; Cascade Pilot can prove to be a worthy addition to anyone’s toolkit that is serious about protocol and network analysis when answers are needed quickly.
Tags : 
network, analyst, information, management
    
Riverbed
Published By: HP     Published Date: Aug 25, 2014
Integrated computing platforms enable IT to focus on more valuable tasks that will speed time-to-market and improve application deployment and availability to better support the business. HP ConvergedSystem 700x with VMware vSphere is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. Built on HP ProLiant or HP BladeSystem servers, HP StoreServ storage, and HP 5900-Series and HP Flex10 networking. HP ConvergedSystem 700x with VMware vSphere solutions are designed to address virtualization complexity, expedite virtualization deployments, and serve as the foundation for private cloud implementations. Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with VMware vSphere versus a comparable conventional data center infrastructure comprised of discrete, nonintegrated compute, storage, network, and management compon
Tags : 
converged system, economic, enterprise, computing, platforms, deployment, vsphere, application, virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business
    
HP
Published By: HP     Published Date: Aug 25, 2014
HP ConvergedSystem 700x with Microsoft Hyper-V is an ideal example of the market transition toward integrated computing platforms. Built on HP’s ConvergedSystem 700x converged infrastructure platform, HP ConvergedSystem 700x with Microsoft Hyper-V is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. The solution is built on HP ProLiant or HP BladeSystem servers, HP 3PAR SAN storage, and HP 5900-Series or HP Flex10 networking. The entire stack is managed through HP Insight Control for System Center, which integrates physical and virtual server management through HP Insight with Microsoft System Center 2012 for unified management and orchestration Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with Microsoft Hyper-V, versus a comparable conventional data center infrastructure comprised of discrete, non-integ
Tags : 
converged system, economic, enterprise, computing, platforms, deployment, vsphere, application, virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business
    
HP
Published By: Dell     Published Date: Mar 30, 2015
Dell has teamed with Intel to create innovative solutions that can accelerate the research, diagnosis and treatment of diseases through personalized medicine. The combination of leading-edge Intel® processors and the systems and storage expertise from Dell create a state-of-the-art solution that is easy to install, manage and expand as required. Download to learn more.
Tags : 
dell, intel, genomics, research, data analysis, gdap
    
Dell
Start   Previous    35 36 37 38 39 40 41 42 43 44 45 46 47 48 49    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.