Skip to main content
 

vendors

Results 526 - 550 of 888Sort Results By: Published Date | Title | Company Name
Published By: Storiant     Published Date: Apr 30, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Published By: Quark Software     Published Date: Mar 19, 2015
With the proliferation of customer experience initiatives, content marketing and an increasing need to fulfill content delivery on mobile devices, digital publishing has now become an important component of the digital toolbox for every organization. Research firm InfoTrends recently released the 2015 Digital Publication Platform Market Overview, which finds that: • Over 90% of enterprises are moving towards electronic documentation. • The digital publishing platform landscape is made up of approximately 60 to 80 main companies, but is dominated by a few vendors that can be considered influencers. • The digital publishing platform market will grow by a 25% CAGR (compound annual growth rate) over the next five years. Learn more about the market, solution providers and take a look at the future of digital publishing in the InfoTrends Digital Publication Platform Market Report.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing, publishing automation, automated authoring, enterprise publishing, digital publishing software, digital publishing solutions, tablet publishing, mobile publishing digital, publishing report digital, publishing analyst report, xml publishing to apps, ipad publishing, digital publishing platform
    
Quark Software
Published By: Quark Software     Published Date: Mar 19, 2015
The growth of the dynamic publishing market is shaping the way organizations develop streamlined enterprise content management strategies, keep up with shifting end-user content consumption trends and acquire the best solutions for scalability, output and ease-of-use. Dynamic publishing solutions is critical for content creators looking to address the largest audience possible. In their report, Analysis of the Global Dynamic Publishing Market, Frost & Sullivan examines the impact and vendor solutions. Download the report to: • Learn why dynamic publishing solutions are gaining significant traction across all industries and verticals • Discover which vendors are competing in the market — from those that offer point-solutions, such as XML authoring tools, to those offering complete end-to-end platforms • Access the latest research and predictions on the dynamic publishing market, which is expected to reach $2.5 billion by 2017
Tags : 
xml authoring, structured authoring, structured content, dynamic publishing, enterprise publishing, automated publishing, publishing automation, xml publishing, publishing platform, xml software, compliance software, xml authoring tools, structured authoring tools, dita, enterprise content management, xml for document production, multi-channel publishing, omni-channel publishing, content reuse, digital publishing
    
Quark Software
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability
    
Equinix
Published By: Avaya     Published Date: Jun 15, 2016
Gartner Report: Critical capabilities for your LAN access infrastructure Does your wired or wireless LAN access solution have the right capabilities for your enterprise? See how Gartner ranked 14 vendors in six common enterprise use case scenarios in this report.
Tags : 
networking, best practices, software, technology, productivity
    
Avaya
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers
    
Duo Security - Nethawk
Published By: Pivot3     Published Date: Oct 12, 2016
Download the full report to learn more about the top providers in the integrated systems market.
Tags : 
gartner magic quadrant, pivot3, integrated systems, hyperconverged integrated systems, hcis, blade-based integrated systems, san-based integrated systems, integrated systems vendors
    
Pivot3
Published By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : 
evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption
    
Evident.io
Published By: ClearCompany     Published Date: Dec 03, 2015
A comparison of the leading recruiting software vendors.
Tags : 
clearcompany, recruiting, software, talent
    
ClearCompany
Published By: ClearCompany     Published Date: Dec 03, 2015
A comparison of the leading talent management software vendors.
Tags : 
clearcompany, talent, talent management, software, top 10
    
ClearCompany
Published By: CDW - EMC     Published Date: Apr 07, 2016
Read more to learn why customers prefer the EMC VNX family over other storage vendors!
Tags : 
storage vendors, customer relations, best practices, virtual infrastructure
    
CDW - EMC
Published By: Qlik     Published Date: Jun 24, 2016
Get your complimentary copy of Gartner’s report for in-depth analysis of where BI is headed in 2016, who the major vendors are, and why Qlik is positioned in the Leaders quadrant for the sixth consecutive year.
Tags : 
qlik, business intelligence, data analytics, business analytics
    
Qlik
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
    
CrowdStrike
Published By: Zebra Technologies     Published Date: Oct 01, 2018
Enterprise vendors providing indoor location services must offer multiple technologies to satisfy diverse use cases. I&O leaders should evaluate vendors based on their ability to meet end-user granularity requirements and address the usage scenarios across the entire targeted vertical market.
Tags : 
    
Zebra Technologies
Published By: Forcepoint     Published Date: Jan 24, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance and security effectiveness. Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to match your needs of distributed networks.
Tags : 
software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security, distributed network, firewall, mpls, evasion, cybersecurity, security efficacy, nss labs
    
Forcepoint
Published By: Ahead     Published Date: Feb 05, 2018
There’s a lot of noise these days about hyper-convergence. IT managers are facing internal pressure to adopt hyper-converged infrastructure (HCI) solutions to make their departments more efficient and “cloud-like” as well as external pressure from vendors fighting for market share in an increasingly crowded space. While an HCI solution could bring your organization significant benefits, it’s not necessarily simple to implement, nor is it the optimal solution for every use case. To determine if HCI is right for you, first we need a clear definition of what it is and what it does.
Tags : 
availability, scalability, operation, maintenance, support, ahead
    
Ahead
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration
    
ThousandEyes
Published By: Emarsys     Published Date: Feb 14, 2018
Not all marketing platforms offer the same services or features, which is why it’s so important that your RFP helps you compare them accurately. These tips should prepare you to collect the information needed to compare prospective vendors on your terms, not theirs. Additionally, our marketing RFP template was designed to help make the whole process easier. Customize it to meet your specific needs, and be sure you get all the information you need from every prospective vendor to make this important decision. Remember, you wouldn’t partner with just anyone to climb Mount Everest. Selecting the right partner for your marketing platform is an important, strategic, long-term decision, with large-scale consequences. Choose wisely.
Tags : 
marketing, platform, rfp, vendors, services, optimization
    
Emarsys
Published By: Janrain, Inc.     Published Date: Apr 25, 2012
A comprehensive user management platform provides the essential tools for improving acquisition, creating engagement and building intelligence. Use this guide when evaluating prospective vendors to select the right user management platform partner.
Tags : 
janrain, marketing, social media, emerging marketing, internet marketing, website, social networks, interactive, web analytics, crm & customer care
    
Janrain, Inc.
Published By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise
    
VMware AirWatch
Published By: Sitecore     Published Date: Feb 04, 2015
This detailed Forrester Wave Model assesses the vendors of Web Content management (WCM) and discovers their focus on marketing scenarios, mobile device support and cloud deployment story.
Tags : 
wcm, mobile, marketing, cloud, search marketing, social media, internet marketing, crm & customer care, e-commerce
    
Sitecore
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.