Skip to main content
 

key findings

Results 51 - 75 of 111Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 02, 2012
IBM recently commissioned Forrester Consulting to evaluate how businesses are changing in the face of today's business environment. Read this report to learn the four key findings driving business decisions today including the customer experience, touchpoints, lack of internal collaboration and non-technology hurdles to business transformation.
Tags : 
forrester, ibm, customer, business, retail
    
IBM
Published By: Teradata     Published Date: Oct 19, 2015
Bruce Rogers, Forbes’ Chief Insights Officer, will discuss the key findings from a survey of senior-level IT and data executives on big data and analytics. He will be joined by Matt Ariker from McKinsey and Chris Twogood from Teradata and together they will present the differences between "leaders" and "laggards" when it comes to analytics initiatives and share how organizations can increase their odds of success with big data and analytics.
Tags : 
big data, analytics, leaders, laggards, anlytics initiative
    
Teradata
Published By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
    
Fitbit
Published By: The Economist Group     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation, social media
    
The Economist Group
Published By: Gartner     Published Date: Dec 21, 2011
Planning and preparation are essential to ensure the success of an enterprise content management (ECM) initiative, now more so than ever given the challenging economic times. Project activities in the first 100 days provide the foundation for the follow-on vendor selection and implementation. Read this guide for key findings and recommendations on implementing ECM systems.
Tags : 
enterprise, gartner, content manegemtn, technology
    
Gartner
Published By: Sitecore     Published Date: Sep 10, 2015
The Five Crucial Lessons Learned In Content Management System Selections analyst report from Digital Clarity Group will help you discover key research findings from stakeholders who have recently been through a CMS selection process and survived, meeting their organizations' needs.
Tags : 
cms, sitecore, vendor selection, cms selection process, search marketing, email marketing, social media, crm & customer care, e-commerce
    
Sitecore
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: IBM     Published Date: Jun 17, 2014
Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.
Tags : 
ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics, cultural alignment
    
IBM
Published By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : 
cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
    
IBM
Published By: SAS     Published Date: Jun 06, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Accessing, analyzing, and actioning with big data are among the key challenges facing every enterprise. In this detailed report from Forrester, you’ll see key drivers and challenges with Big Data, AND some clear recommendations on how to proceed. Get the white paper to see Forrester's key findings.
Tags : 
lenovo, data access, big data, data analysis
    
Lenovo and Intel®
Published By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : 
tripwire, legacy log management, data security, compliance automation solutions, it security, cso
    
Tripwire
Published By: IBM     Published Date: May 08, 2018
Our recent Ponemon Institute report reveals key findings from organizations' ability to protect their mobile and IoT apps.
Tags : 
iot application security, iot apps, security
    
IBM
Published By: HireRight     Published Date: Oct 03, 2012
This white paper reveals key findings from a comparative test conducted by J.B. Hunt, a top for-hire motor carrier, a comparative drug testing index by Quest Diagnostics and more.
Tags : 
    
HireRight
Published By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : 
mobile apps, it statistics, mobile trend statistics, mobile app backlog
    
OutSystems
Published By: Cisco     Published Date: Dec 21, 2016
What are the key elements of a collaboration framework that can help IT decision makers (ITDMs) and business decision makers (BDMs) come to a mutual understanding of how, where and why to use videoenabled collaboration solutions, in particular, F2F video? To answer this question, Techaisle conducted a survey of 1,269 ITDMs and BDMs with SMBs and midmarket businesses, across the US, Latin America, Europe, and Asia Pacific. The survey was commissioned by Cisco. The survey findings provide guidance to SMBs and midmarket decision makers on how the nature of the collaboration discussion is changing, drive acceptance and use of F2F video throughout their organization to maximize business payback, and align objectives with the outcomes that shape the activities of highgrowth innovative firms who are the most successful users of advanced collaboration technology.
Tags : 
    
Cisco
Published By: SurveyMonkey     Published Date: Aug 25, 2015
SurveyMonkey Audience fielded a Brand Pulse study to better understand consumer buying behaviors for the L’Oréal brand and other key players within the shampoo market.
Tags : 
brand management, data insights, surveymonkey, consumer behaviors, key findings, best practices, purchase decisions, crm, data management, crm & customer care, marketing research
    
SurveyMonkey
Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Cornerstone and HCMG have benchmarked the last five years of progress in human capital management for government. Let's take a look at the key findings from this year’s study.
Tags : 
capital, management, government, cornerstone
    
Cornerstone OnDemand
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies
    
Riverbed
Published By: HireRight     Published Date: Jul 19, 2013
Hair testing can identify drug use as far back as three months and it is much more difficult to tamper with than urine testing. This white paper reveals key findings from a comparative test conducted by J.B. Hunt, a top for-hire motor carrier, a comparative drug testing index by Quest Diagnostics and more.
Tags : 
    
HireRight
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.