Skip to main content
 

analysis

Results 1226 - 1250 of 1263Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Ultimately, technology can minimize compromises so that everyone becomes a winner. In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility is a compromise-free approach, and how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
byod, mobility, analysis, enablement
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 02, 2015
The benefits of a mobile-enabled workforce are undeniable and far-reaching. For business owners, increasing operational and business velocity is no longer tethered by time and place. The untethering benefits of mobility extend to employees, too, both in their personal productivity and in balancing their personal and work lives.
Tags : 
byod, mobility, analysis, enablement
    
VMware AirWatch
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis
    
IBM
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
perconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand th
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the key requirements enterprise IT administrators should consider as they begin their initial deployments or expand
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: -What are the most effective uses of HCI today and in the future -Who benefits from HCI, and who doesnt -What enterprise infrastructure challenges could be solved with HCI This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the ke
Tags : 
    
Dell EMC
Published By: Dakota Software     Published Date: Mar 03, 2017
Since 2001, with the introduction of software tools for EHS and sustainability management, NAEM has been tracking the growth of the marketplace, the use of these tools within companies and the trends associated with software-supported data management.This biannual Buyers Guide report is a unique benchmark, designed to inform the software selection process, and to identify emerging priorities among software shoppers. It provides a peer perspective into many common questions asked, including in-depth information on the following topics: • Existing system maturity • Business objectives • Desired software capabilities • Peers spending and expected maintenance costs This detailed purchasing analysis provides current shoppers with a past purchasers’ perspective of expectations vs. reality. As a sponsor of the report, Dakota Software is pleased to provide this complimentary copy.
Tags : 
    
Dakota Software
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: BlackLine     Published Date: Jan 25, 2017
Download this whitepaper to learn more about how Continuous Accounting empowers the Office of Finance with real-time intelligence, enabling skilled accountants to spend more time on strategic research and analysis, and become proactive business leaders instead of reactive operators.
Tags : 
    
BlackLine
Published By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems
    
IBM
Published By: IBM     Published Date: Aug 24, 2016
Read this data sheet to discover tools and features available in the new release to help you accelerate and simplify your analysis.
Tags : 
ibm, spss, ibm spss, statistics, analytics, business applications
    
IBM
Published By: IBM     Published Date: Aug 24, 2016
Watch now to discover how IBM SPSS Statistics 24 can help you provide quick, insightful data analysis. Learn more about IBM SPSS.
Tags : 
ibm, analytics, spss, ibm spss, statistics, spss statistics
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Read this SWOT report from Ovum to get an in-depth analysis of IBM B2B Cloud Services and learn about the strengths, weaknesses, opportunities, and threats for organizations like yours.
Tags : 
ibm, commerce, b2b, b2b integration, cloud services, cloud, ovum
    
IBM
Published By: Anaplan     Published Date: Apr 14, 2016
Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization.
Tags : 
    
Anaplan
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
It’s easy to assume that running IT apps on-premises is not cost competitive with cloud-based services. Evaluator Group tests the validity of that assumption with a TCO model analyzing a hyperconverged solution from HPE and a comparable AWS solution.
Tags : 
    
Hewlett Packard Enterprise
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 26, 2018
In the global market for customer service software, Zendesk is once again recognized as a leader in the 2018 Gartner Magic Quadrant for the CRM Customer Engagement Center. Every year, Gartner conducts a thorough analysis of service providers in the customer service and support application space. We believe the Gartner Magic Quadrant for the CRM Customer Engagement Center report provides valuable information for business leaders who seek technology solutions for interacting and engaging with their customers. Zendesk can again be found in the 2018 report’s Leader quadrant, which we consider a reflection of the success of our 125,000 customers, including enterprise clients like Airbnb, Tesco, and the University of Tennessee. The past year alone has included a number of significant milestones for us, including the release of AI-enhanced features for self-service and surpassing $500 million run rate in revenue. As our customer base continues to grow, we strive to be a dynamic vendor for bus
Tags : 
    
Zendesk
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
Published By: CBRE     Published Date: Aug 02, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
microsoft strategy, mobileiron, data analysis, video blog
    
CBRE
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 11, 2017
Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence - Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
    
Lookout
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.