Skip to main content
 

assessment

Results 151 - 175 of 521Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Jan 03, 2017
The scope and value that modern IT service delivery provides a business is increasing dramatically, according to a new research reportfrom Enterprise Management Associates (EMA). And yet in some organizations legacy ITSM systems contribute significantly to reduced credibility for IT departments who fail to integrate with and support important business concerns. This lack of modern IT service delivery creates multiple issues for the enterprise, including: Increasing divergence of IT and business performance Rising costs due to service delivery complexity Inability to measure and protect a business from potential risks Informed by extensive research and two compelling deployment narratives, this report examines what EMA calls “next-generation ITSM” and its contributions toward optimizing changing IT and business requirements. EMA contrasts these advances with the risks of staying with legacy ITSM models and then evaluates and itemizes the risks of “doing nothing” by allowing legacy ITS
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management
    
ServiceNow
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: VMware AirWatch     Published Date: Dec 08, 2016
This vendor assessment explores VMware’s strengths, challenges and IDC MarketScape's methodology for naming VMware Horizon a leader for two consecutive years in client computing software and virtualization.
Tags : 
    
VMware AirWatch
Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark
    
Veracode
Published By: CEB Global     Published Date: Oct 27, 2016
As a leader in the field of talent assessment, we have identified 10 best practices for establishing a worldclass assessment function that leads to important business outcomes and helps transform talent leaders from process experts to talent advisors.
Tags : 
ceb global, ceb, talent management, talent assessment, candidate data, data, hiring
    
CEB Global
Published By: IBM     Published Date: Oct 20, 2016
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly "wow" your team.
Tags : 
ibm, security, ciso, cloud iam, identity service device, idaas
    
IBM
Published By: Polycom     Published Date: Oct 17, 2016
Some Do's include: Doing a network assessment, and doing you due diligence. Some Don't's include: Not giving up on the handset, and not waiting to get started. Download this helpful white paper to learn more.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Oct 17, 2016
This IDC study uses the IDC MarketScape model to provide an assessment of the 11 top vendors in the worldwide enterprise video conferencing equipment market. The IDC MarketScape is an evaluation based on a comprehensive framework and a set of parameters that assess vendors relative to one another and to those factors expected to be most conducive to success in a given market during the short term and the long term.
Tags : 
    
Polycom
Published By: IBM     Published Date: Oct 17, 2016
See how you can turn data into actionable insights with predictive analytics. Take our brief assessment to learn which analytical capabilities will enable you to find the greatest value in your data and make confident, accurate business decisions.
Tags : 
ibm, analytics, spss, stats, modeler, predictive analytics
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Read this SWOT report from Ovum to get an in-depth analysis of IBM B2B Cloud Services and learn about the strengths, weaknesses, opportunities, and threats for organizations like yours.
Tags : 
ibm, commerce, b2b, b2b integration, cloud services, cloud, ovum
    
IBM
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: Viavi Solutions     Published Date: Sep 30, 2016
Organizations planning to migrate all or a portion of their applications or services to a public cloud environment will benefit from the experiences of early adopters. As a leader in hybrid IT monitoring, Viavi Solutions® has been involved at all stages of the cloud-migration life cycle: during assessment, implementation, and after deployment. Based on Viavi’s and our technology partners’ experience and many conversations with customers, prospects, and others in the industry, this white paper offers insight into 6 key questions regarding cloud adoptions: 1. Why Migrate 2. What to Migrate 3. What are the Steps to Cloud Migration 4. When to Migrate 5. Where to Migrate 6. Who to Ask for More Help
Tags : 
    
Viavi Solutions
Published By: Qualys     Published Date: Sep 29, 2016
With SAQ, an organization can quickly and precisely identify security and compliance gaps among third parties, as well as internally among its employees.
Tags : 
security, cloud-based, data, audit
    
Qualys
Published By: Dell EMC     Published Date: Sep 12, 2016
The importance of IT has never been greater. Companies are transforming their business models with digital technologies, leveraging emerging mobile and social platforms, and increasingly operating online. And all of these developments are powered by IT innovation.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Sep 08, 2016
This white paper represents the vendor assessment model called the IDC MarketScape.
Tags : 
    
Cisco
Published By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : 
collaboration, enterprise collaboration, video conferencing, video meetings, video
    
AVI-SPL
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
Published By: Genesys     Published Date: Jul 27, 2016
Customer service has been, and will continue to be, a central concern for most companies. Designing and delivering a positive customer experience relies heavily on the framework and capabilities of your call center or contact center, specifically the ability to support omnichannel interactions. The IDC MarketScape examines 12 key players in the worldwide contact center infrastructure and software (CCIS) market, analyzing their current capabilities as well as longer term strategies that impact their ability to service customers and gain market share going forward.
Tags : 
genesys, omnichannel, contact center, customer experience, metrics, enterprise applications
    
Genesys
Published By: IBM     Published Date: Jul 22, 2016
IBM B2B Cloud Services comprise a comprehensive set of cloud-based B2B integration features and capabilities, which can be delivered on demand, as fully managed services, or under a hybrid management model. With IBM B2B Cloud Services, enterprises can meet a range of trading partner onboarding and management requirements, as well as improving reliability and performance of and control over multi-enterprise process automations.
Tags : 
ibm, commerce, swot assessment, ibm b2b cloud services, cloud, b2b, b2b integration
    
IBM
Published By: IBM     Published Date: Jul 21, 2016
Watch this webinar and learn how you can: - Hire for leadership behaviors - Identify high potential leaders in your organization - Develop your leadership pipeline
Tags : 
ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
In this presentation you’ll see and learn: - How companies are implementing pre-hire reference assessments - What pre-hire assessments can do for your company - How they decrease turnover amongst high performers - Why they lead to higher employee job performance - How they enable top companies to identify the highest potential candidates available
Tags : 
ibm, employee engagement, smarter workforce, pre-hire assessments
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
- Learn how the best companies use online assessment analytics to predict candidate performance - Find out about the analytics intelligence used to improve quality of new hires - Learn how assessments can be used to maximize employee breakthrough performance
Tags : 
ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.