Skip to main content
 

vendors

Results 76 - 100 of 915Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : 
credential abuse, bots, marketing, bot management, bot solutions
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: EMC Corporation     Published Date: Dec 19, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis
    
EMC Corporation
Published By: Adobe     Published Date: Sep 26, 2013
Enterprises strive for ever-greater business impact from their online presence, demanding more from Web content management than it has traditionally delivered. In this Gartner report, you'll find how well WCM vendors are responding, providing insights for buyers and those reviewing their existing applications.
Tags : 
web content management, buyer insights
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Marketers’ social media successes have added to their burdens. Many now have dozens of social pages to manage, thousands of customer comments to monitor, and hundreds of colleagues who want (or need) to participate. Social relationship platform vendors off er tools that help marketers efficiently and responsibly expand their social capabilities.
Tags : 
adobe, forrester social wave, social relationship platform, srp, significant vendors, branded social presence, social relationship, platform evaluation, srp space, undifferentiated players, interactive marketing, managing social presence, customer engagement, marketing tactics, manage large deployments, managing workflow, marketing content, social applications, customer feedback
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
In Forrester’s 53-criteria evaluation of online testing platform vendors, we identified the seven most significant providers — Adobe, Autonomy, Maxymiser, Monetate, Optimizely, SiteSpect, and Webtrends — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria, and where these vendors stand in relation to each other, to help customer intelligence professionals select the right partner for their online testing needs.
Tags : 
adobe, forrester wave, online testing platforms, vendor selection, optimize core competency, digital marketers, maturing vendor solutions, future of online testing, growing online testing requirements, online testing vendors, balance functionality, balance usability, customer intelligence, right partner, online testing needs, internet marketing
    
Adobe
Published By: Possible EMC     Published Date: Dec 22, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis
    
Possible EMC
Published By: ServiceNow     Published Date: Sep 02, 2015
See why Gartner's 2015 Magic Quadrant recognizes ServiceNow as a leader for the second year in a row. Each year Gartner assesses the viability and competitive strength of vendors in the IT service support management (ITSSM) space. This valuable report helps users determine which solutions best fit their needs, based on the tool capabilities, the integration with IT Operations Management solutions and more than a dozen other factors. For the 2nd year in a row, ServiceNow is recognized as a Leader in this Gartner Magic Quadrant. Check out what makes us different. Get the full, complimentary report to: • Receive an assessment of key vendors • Get a snapshot of the overall market overview • Learn why ServiceNow remains a leader
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 06, 2015
IT service support management tools are vital for infrastructure and operations organizations to manage support and delivery of IT services. This Magic Quadrant research profiles key vendors of enterprise ITSSM tools to help I&O leaders make better selections.
Tags : 
    
ServiceNow
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Pega     Published Date: Feb 02, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack.
Tags : 
    
Pega
Published By: SAP     Published Date: Apr 20, 2017
The ERP market continues to shift rapidly as adoption of cloud-based systems increases and vendors add capabilities. Check out the cutting edge of what vendors are bringing to market, and consider why SAP S/4HANA Cloud software is a leader in enterprise management, professional services, and marketing, as well as a private cloud deployment option.
Tags : 
nucleus, research, erp, technology, value, matrix, sap
    
SAP
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : 
connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
Published By: Adobe     Published Date: Aug 27, 2013
Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
web content management, wcm, wcm vendors
    
Adobe
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology
    
BMC Software
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.