Skip to main content
 

vendors

Results 101 - 125 of 917Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : 
connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
Published By: Adobe     Published Date: Aug 27, 2013
Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
web content management, wcm, wcm vendors
    
Adobe
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology
    
BMC Software
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Zendesk     Published Date: Jan 03, 2019
After its founding, Mediaocean evaluated 10 customer service vendors before choosing the Zendesk Support platform to manage its global support activities. Three years later, however, a private equity firm acquired a majority share of the company and mandated switching to an alternative platform. See why Mediaocean reverted back to Zendesk and how the company uses Zendesk to power their customer support needs.
Tags : 
    
Zendesk
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Adobe     Published Date: Jan 27, 2014
Tools and Technology: The Social Marketing Playbook
Tags : 
social media, social media marketing, social technology, social reach, social vendors
    
Adobe
Published By: Adobe     Published Date: Aug 20, 2014
This report crtically evaluates digital experience providers and identifies the 13 most significant software vendors to research, analyse and score them.
Tags : 
digital experience, adobe, evaluation of software vendors, choosing your software vendor, content delivery, content management, marketing cloud
    
Adobe
Published By: Adobe     Published Date: Oct 30, 2014
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
In 2015, AgilOne, Microsoft and Pegasystems entered an already crowded market of multichannel marketers to choose from. Capabilities across the board expanded, making it harder for multichannel campaign management vendors to prove big competitive differences.
Tags : 
multichannel campaign management, magic quadrant, choosing the right mcm, which mcm, evaluation of mcm providers, adobe mcm, emerging marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
The multichannel campaign management (MCCM) market comprises vendors that seek to orchestrate company communications and marketing offers to customer segments across channels, such as websites, mobile, social, direct mail, call centers and email.
Tags : 
multichannel campaign management, campaign management, mccm, digital marketing
    
Adobe
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
The majority of enterprise software is now consumed via SaaS or cloud deployments. Despite a perception of simplicity in software acquisition, many cloud contracts require all the rigor and due diligence of contracts for on-premises licensed software. The Enterprise Cloud Buyer's Bill of Rights provides a tool for clients and vendors to change the tenor of contract negotiations from user subservience to an equal and collaborative long-term partnership.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite
    
Netsuite DWASF Leads Display Q1 2015
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"Agility, customer experience and headless commerce are key features in the next wave of digital commerce platforms, as application leaders guiding B2C, B2B and B2B2C organizations try to keep pace with the digital economy. Read this report to learn: - Key findings and recommendations for digital commerce and application technology leaders - Critical capalities for a modern digital commerce platform - Evaluation and rating of 21 digital commerce vendors"
Tags : 
    
Oracle Commerce Cloud
Published By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
Published By: Sitecore     Published Date: Mar 27, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
    
Sitecore
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.