Skip to main content
 

comparison

Results 226 - 250 of 276Sort Results By: Published Date | Title | Company Name
Published By: Wheelhouse Enterprises     Published Date: Apr 15, 2009
Quickly see differences between brands like Avaya, Mitel, Cisco, ShoreTel, 8x8, Panasonic, etc and compare over 94 phone systems by 52 brands for small to big business. Our latest Spring 2010 edition of the chart also compares PBX and Business VoIP systems side by side so you can make an educated comparison of your options. This analysis is prepared in an easy to use Excel spreadsheet so you can edit and add information to suit your analysis and presentation needs.
Tags : 
compare, compare business products, wheelhouse, avaya, mitel, cisco, shoretel, 8x8
    
Wheelhouse Enterprises
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: Jobvite     Published Date: May 15, 2017
If you’re ready to invest in a recruiting platform, then you know you’re in for countless weeks, or maybe months of due diligence—tireless research, vendor comparisons, wading through user testimonials, and reviews. But perhaps just as important as finding the right recruiting platform is getting executive buy-in for investing in your platform of choice. It pays to rally support and start the buy-in process early.
Tags : 
    
Jobvite
Published By: AdRoll     Published Date: Feb 21, 2018
This is Econsultancy’s second State of Marketing Attribution report, published in association with AdRoll and based on an online survey of 987 practitioners in Europe, North America and Asia-Pacific. We expanded on last year’s report, which focused solely on Europe, and made the report a global comparison. This report reviews the current adoption levels of marketing attribution, the confidence in its usage and the effectiveness of companies’ attribution methods.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
Published By: Larson Electronics     Published Date: Jan 15, 2016
This report is a comprehensive comparison of the various uses of ultraviolet (UV) light in industrial settings. Specifically, the purpose of this study is to expound on the application of UV light for paint curing. The study covers its implementation in several fast-moving sectors, such as automobile, medical manufacturing and housing. Managers, engineers and other professionals can use the compilation to understand and maximize the usability of UV light in daily operations.
Tags : 
    
Larson Electronics
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals
    
ForeSee Results
Published By: Aladdin     Published Date: Aug 21, 2009
This in-depth 14-page white paper explains all available anti-spam techniques and how they are used by eSafe. It also includes a "Dare to Compare" competitive matrix for easy vendor/solution selection.
Tags : 
spam, anti-spam, anti spam, comparison guide, comparison chart, comparison table, email security, anti-spam software
    
Aladdin
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Technical Primer explains how SSL VPNs work, and includes an objective comparison of the distinguishing factors between IPSec and SSL VPN technologies. You'll learn why these two technologies, based on fundamentally different designs and methodologies, each serve specific use cases best.
Tags : 
ssl, vpn, ssl vpn, comparison table, comparison guide, comparison chart, ipsec, ipsec vpn
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access
    
Aventail
Published By: Metafuse     Published Date: Sep 26, 2007
We are often asked how Project Insight differs from the Microsoft solution. There is no simple, 30 second answer to that question, as every software package is unique. Rather than attempt to detail a feature by feature comparison, here we offer the reader an overview of what we view as the main differences.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse
    
Metafuse
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage
    
Spectra Logic
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
    
Infor
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals
    
ForeSee Results
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter
Published By: InsideCRM.com     Published Date: Aug 13, 2007
Use this crisp and clean comparison chart to stack the top CRM vendors side-by-side on the following:  Features, Price per User, Services and Support, and Marketing Capabilities.
Tags : 
crm, crm tool, crm tools, crm software, customer relationship management, salesforce, right now, rightnow
    
InsideCRM.com
Published By: ITManagement     Published Date: Nov 06, 2007
Our handy comparison chart lines up the vendors in the market and compares the most important factors in a networking equipment decision.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet
    
ITManagement
Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting
    
Websense
Published By: Easynet     Published Date: Mar 26, 2008
From the results of recent interviews with LET organisations, IDC positions the industry in the midst of a major transition phase from legacy to next-generation services and technology. This Executive Brief highlights the major technology and business trends taking place in the LET sector, and outlines the advantages of adopting new technologies and services in comparison with other industries.
Tags : 
leisure, entertainment, travel services, technology, managed networks, easynet
    
Easynet
Published By: Platform Computing     Published Date: Jul 16, 2008
This white paper primarily focuses on the expanding role of HPC management software in the HPC marketplace. The paper emphasizes its historical development and considers its business case and future prospects while dispensing with more elaborate technical analysis and product comparisons.
Tags : 
middleware, platform computing, platform
    
Platform Computing
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Today's buyers possess a wealth of comparison shopping information. But you can be smarter, too. Learn how you can prioritize your inbound contacts in a split second, applying a wealth of information to instantly convert a prospect to a sale.
Tags : 
targus, targus info, targusinfo
    
TARGUSinfo.
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : 
software security, endpoint security, antivirus software, malware
    
Software Security Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.