Skip to main content
 

assessment

Results 326 - 350 of 519Sort Results By: Published Date | Title | Company Name
Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection
    
Rapid7
Published By: IBM     Published Date: Oct 01, 2013
Two years ago Clabby Analytics wrote a report that evaluated Cisco’s Unified Computing System (UCS) and revealed shortcomings in the UCS design, stating that Cisco blade environments are “good enough” computing environment. Since then Cisco made improvements to their system design, but the blade market didn’t stand still waiting for them to catch up as IBM announced a new system design: the IBM Flex System. Continue on to this new assessment from Clabby Analytics that compares Cisco’s UCS blade server offering to IBM Flex System’s in a soup-to-nuts evaluation. Also find out how these two major players compare to the competitors in the blade marketplace.
Tags : 
ibm, ibm flex system, computing system, blade, compute nodes, computing, storage, networking, systems management, it systems
    
IBM
Published By: IBM     Published Date: Sep 30, 2013
The Smarter Workforce Accelerator uses a structured model that helps you understand your current capabilities and those that you need to develop to achieve your Smarter Workforce objectives. The assessment focuses on your current environment and capabilities such as scouting talent, recruiting talent, leadership development, and your work culture and methods. Each capability is assessed using an objective framework that defines the characteristics of an organization at each level. This approach helps you understand: • Your current and desired capability levels • Your organization’s relative maturity compared with the competition and leading practice • Business opportunities and priorities resulting from the capability gaps
Tags : 
ibm, ibm smarter workforce accelerator, workforce management, social business, technology, smarter workforce, recruiting, staffing, training, development
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
hrg, harvard research group, ibm, ibm pureflex system, ibm flex system, applications, application delpoyment, application integration, integration, integrated system, it resources, computing, storage, networking, virtualization
    
IBM
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
The Dell SecureWorks Security and Risk Consulting practice delivers the independent expertise, experience and perspective you need to address your security, risk and compliance concerns.
Tags : 
dell, dell secureworks, risk consulting, cyber security, security
    
Dell SecureWorks
Published By: IBM     Published Date: Sep 09, 2013
Read this free whitepaper from Forrester Consulting's recent assessment of the current security skills landscape and what they think is the best way to overcome it
Tags : 
technical security skills, security skills, crisis, forrester consulting, security skills landscape, ciso
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Published By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : 
incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis, benchmark, report, risk, assessment, board, investigation, training, policy, case, management
    
NAVEX Global
Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : 
enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
    
IBM
Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions
Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: Dex     Published Date: Jul 09, 2013
Keep Marketing Simple. Get Found and be Chosen in 2013: In today’s complicated marketing landscape, you need to ensure that your business name appears when and where local customers are looking.
Tags : 
dex, free assesment, marketing, marketing landscape, free and easy assessment, consumer behavior, local customers, traditional marketing
    
Dex
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology
    
EMC Corporation
Published By: CEB     Published Date: Jun 19, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : 
talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
    
CEB
Published By: CEB     Published Date: May 09, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : 
talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
    
CEB
Published By: CAST     Published Date: May 06, 2013
Download the paper to learn about CAST Application Intelligence Platform (AIP), the only enterprise-grade software quality assessment and performance measurement solution available.
Tags : 
architecturally complex violation, architectural hotspot, architecture of decay, cast, cast aip
    
CAST
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment
    
SilverSky
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: AvePoint     Published Date: Mar 07, 2013
This assessment helps organizations identify sensitive or regulated content and develop a best practices approach to separate that content or workloads, and subsequently migrate appropriate content to the cloud.
Tags : 
cloud readiness, cloud, avepoint, sharepoint, cloud implementation, cloud migration, moving to the cloud
    
AvePoint
Published By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.