Skip to main content
 

vendors

Results 426 - 450 of 952Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 09, 2017
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Tags : 
    
Adobe
Published By: Looker EMEA     Published Date: Sep 27, 2017
Deploy Business Intelligence in Days, Not Months. Fastest Implementation Time -Up and running in 24 days compared to 78 on average (300% faster). ? Ease of Use - Top to bottom, Looker is easier ? User Adoption - More data lovers switch to Looker Deploying a new BI platform doesn’t have to be a long, painful process anymore. See how 21 leading BI vendors compare in terms of overall user satisfaction for implementation -Download the Report >>
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Looker EMEA
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Brightpearl     Published Date: Nov 19, 2012
If you're frequently purchasing new stock from vendors and fulfilling multiple orders yourself every day then it is essential that you have a good purchasing process in place. Read on to learn 14 reasons why placing purchase orders are so important.
Tags : 
brightpearl, placing purchase, orders, order purchase, process management, retail
    
Brightpearl
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Arcserve     Published Date: Jul 26, 2010
Business is driving IT operations management to become increasingly application-centric. At the same time, applications are becoming more difficult to manage. How vendors respond to the application performance monitoring challenge will have a profound impact on their overall market positions.
Tags : 
ca technologies, magic quadrant, application performance monitoring, it operations management, apm
    
Arcserve
Published By: Cisco     Published Date: Apr 08, 2014
Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Tags : 
cisco, malware detection, malware threats, security, cloud computing, swg vendors
    
Cisco
Published By: Burton Group     Published Date: Apr 08, 2008
Increasing power demands and space limitations in the data center have begun to transition server virtualization technologies from luxuries to necessities. Server virtualization provides a path toward server consolidation that results in significant power and space savings, while also offering high availability and system portability. Today, vendors are building hardware and software platforms that can deliver virtualization solutions at near-native performance.
Tags : 
burton group, virtual server, virtual machine, virtualization, server virtualization, virtual architecture, virtualization architecture, virtual
    
Burton Group
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: BMC Control M     Published Date: Jul 22, 2009
Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
Tags : 
quadrant, magic quadrant, job scheduling, bmc control-m, workload, automation broker, gartner, data, job, itwab, it workload automation broker
    
BMC Control M
Published By: EMC Corporation     Published Date: Nov 08, 2011
This study provides the market size and initial five-year forecast for the worldwide PBBA market as part of IDC's Storage Solutions coverage.
Tags : 
back up, backup, backup appliance, forecast, purpose built, pbba, storage solutions, storage, revenue, vendors, terabytes, 2015, 2014, 2013, 2012, 2011, 2010
    
EMC Corporation
Published By: Ultimate Software     Published Date: Sep 14, 2012
These are priority questions you should move to the top of your list. Use these must-ask questions as a checklist in your research. The answers wil guide you to pick the best HCM solution for the greatest value, effectiveness, and long-term use.
Tags : 
human resources, payroll, human capital management, saas, workforce management
    
Ultimate Software
Published By: Citrix Systems     Published Date: Oct 07, 2014
The rapid increases in computing power described by Moore’s Law offer theoretical advantages for IT organizations—but it’s market competition that translates those benefits into real value. As vendors battle for market share, costs are falling for every part of the desktop virtualization architecture. Meanwhile, desktop virtualization technology itself is advancing quickly, providing new ways to enable business mobility and enabling the flexibility that people and organizations need to thrive. This trend is a double win for customers—better solutions at a lower cost—and it’s making the benefits of a service-based approach to IT available to any organization.
Tags : 
value, cost, virtualization, desktop, computing, power, theoretical, advantage, organization, rapid, increase, solution, mobility
    
Citrix Systems
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
Unlike large enterprises, smaller and mid-size businesses (SMBs) often rely on small teams - sometimes even a single person - to configure and manage their IT systems, including their databases.
Tags : 
smb, database application, easy deploy, easy maintenance, scalability, high-availability, mid-sized organizations, departmental deployments, isv
    
Oracle Global Marketing
Published By: LogMeIn     Published Date: Jan 15, 2014
Nucleus found that the ease of use for end users and administrators led to increased adoption, improved business productivity, and IT efficiencies. Also, join.me’s low pricing relative to functionality resulted in significant cost savings.
Tags : 
logmein, join.me, conferencing, collaboration, support presentations, online collaboration, ease of use, increase adoption, business productivity, it efficiency, cost savings, it support, quality experience, communications server, conferencing vendors, traditional vendors, cloud-based collaboration, content developer
    
LogMeIn
Published By: LogMeIn     Published Date: Jul 18, 2014
This paper provides a Live Chat Comparison with a goal-driven approach to chat vendor selection.
Tags : 
live chat, boldchat, logmein, comparing live chat vendors
    
LogMeIn
Published By: LogMeIn     Published Date: Oct 08, 2015
This report defines the recommended technology stack for field services, as well as listing the top-installed vendors in each technology category.
Tags : 
field services, technology, automation for field services
    
LogMeIn
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.