Skip to main content
 

vendors

Results 101 - 125 of 975Sort Results By: Published Date | Title | Company Name
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Pega     Published Date: Feb 02, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack.
Tags : 
    
Pega
Published By: SAP     Published Date: Apr 20, 2017
The ERP market continues to shift rapidly as adoption of cloud-based systems increases and vendors add capabilities. Check out the cutting edge of what vendors are bringing to market, and consider why SAP S/4HANA Cloud software is a leader in enterprise management, professional services, and marketing, as well as a private cloud deployment option.
Tags : 
nucleus, research, erp, technology, value, matrix, sap
    
SAP
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : 
connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
Published By: Adobe     Published Date: Aug 27, 2013
Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
web content management, wcm, wcm vendors
    
Adobe
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology
    
BMC Software
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Zendesk     Published Date: Jan 03, 2019
After its founding, Mediaocean evaluated 10 customer service vendors before choosing the Zendesk Support platform to manage its global support activities. Three years later, however, a private equity firm acquired a majority share of the company and mandated switching to an alternative platform. See why Mediaocean reverted back to Zendesk and how the company uses Zendesk to power their customer support needs.
Tags : 
    
Zendesk
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: Adobe     Published Date: Jan 27, 2014
Tools and Technology: The Social Marketing Playbook
Tags : 
social media, social media marketing, social technology, social reach, social vendors
    
Adobe
Published By: Adobe     Published Date: Aug 20, 2014
This report crtically evaluates digital experience providers and identifies the 13 most significant software vendors to research, analyse and score them.
Tags : 
digital experience, adobe, evaluation of software vendors, choosing your software vendor, content delivery, content management, marketing cloud
    
Adobe
Published By: Adobe     Published Date: Oct 30, 2014
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software, emerging marketing, social media, advertising agencies, marketing research
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
In 2015, AgilOne, Microsoft and Pegasystems entered an already crowded market of multichannel marketers to choose from. Capabilities across the board expanded, making it harder for multichannel campaign management vendors to prove big competitive differences.
Tags : 
multichannel campaign management, magic quadrant, choosing the right mcm, which mcm, evaluation of mcm providers, adobe mcm, emerging marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.