Skip to main content
 

vendors

Results 226 - 250 of 952Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Jun 15, 2018
The ADC market continues to evolve, with various new cloud-integrated and software-centric use cases having arisen. This report provides infrastructure and operations leaders with a snapshot of the market's transition and profiles vendors representative of emerging and very different approaches.
Tags : 
    
Citrix
Published By: Citrix Systems     Published Date: Oct 07, 2014
The rapid increases in computing power described by Moore’s Law offer theoretical advantages for IT organizations—but it’s market competition that translates those benefits into real value. As vendors battle for market share, costs are falling for every part of the desktop virtualization architecture. Meanwhile, desktop virtualization technology itself is advancing quickly, providing new ways to enable business mobility and enabling the flexibility that people and organizations need to thrive. This trend is a double win for customers—better solutions at a lower cost—and it’s making the benefits of a service-based approach to IT available to any organization.
Tags : 
value, cost, virtualization, desktop, computing, power, theoretical, advantage
    
Citrix Systems
Published By: Citrix Systems     Published Date: Dec 10, 2015
When vendors compete, desktop virtualization customers win. Moore’s Law and market forces lead to better solutions at a lower cost.
Tags : 
citrix, desktop virtualization, app, virtualization, mobility
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : 
citrix, security, enterprise, mobility
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility
    
Citrix Systems, Inc.
Published By: ClearCompany     Published Date: Dec 03, 2015
A comparison of the leading recruiting software vendors.
Tags : 
clearcompany, recruiting, software, talent
    
ClearCompany
Published By: ClearCompany     Published Date: Dec 03, 2015
A comparison of the leading talent management software vendors.
Tags : 
clearcompany, talent, talent management, software, top 10
    
ClearCompany
Published By: ClearStory     Published Date: Oct 07, 2014
When it comes to “big data,” Gartner boils it all down to “value.” In their 2014 Cool Vendors for Big Data report, ClearStory Data was among 4 companies profiled. According to Gartner, ClearStory is “for companies looking at big data business intelligence and analytics from a data variety perspective.”
Tags : 
big data, value, business intelligence, analytics, data variety
    
ClearStory
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise
    
ClickExpress
Published By: CloudHealth by VMware     Published Date: Feb 26, 2019
Chances are, your organization is already on a path to a hybrid cloud architecture. But as an IT leader, can you confidently state that you have a clear and defined hybrid cloud strategy? With teams running in many different directions and little consensus on what hybrid cloud means, you may not know where to begin. This white paper will help you get started. It will guide you through the benefits and challenges of a hybrid cloud architecture and help you develop your hybrid cloud strategy, including: -The components of an effective hybrid cloud strategy -Selecting and managing cloud vendors -The people and skills you will need to accomplish your vision -Demonstrating sufficient ROI on your IT spend Download this free white paper today and get started building a world-class hybrid cloud strategy.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Feb 26, 2019
This Forrester Wave report is the result of a rigorous vendor evaluation conducted over several months by the Forrester Research team. In this report, Forrester covers: -Their criteria and scoring method -The top nine vendors in the cloud cost monitoring and optimization space -How vendors are evaluated in current offering, strategy, and market presence To build out your short list, dive into Forrester's detailed analysis and make an informed decision on your future cloud cost monitoring and optimization solution.
Tags : 
    
CloudHealth by VMware
Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cohesity     Published Date: Apr 24, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Collaborative Consulting     Published Date: Dec 23, 2013
There are some surprisingly straightforward reasons behind the glitches, delays, and cost-overruns that can bedevil data warehouse initiatives. ...The first is simply confusing expectations with requirements. But four other troublemakers can also lead to big problems for developers, IT departments, and organizations seeking to maximize the business value of information.
Tags : 
collaborative consulting, data warehouse, failed projects, business intelligence, business solution, meet expectations, big data, profile importance
    
Collaborative Consulting
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: Cornerstone OnDemand     Published Date: Sep 13, 2016
Investing in talent management software leads to bottom line results, but only if you’ve identified your company’s needs and goals, and know what questions to ask vendors. Instead of taking a “shop ‘till you drop” approach (where you risk looking forever, but end up with nothing except headaches and wasted resources), check out this how-to guide for successfully finding the right talent management tools to truly implement your company’s vision!
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jul 06, 2016
Investing in talent management software leads to bottom line results, but only if you’ve identified your company’s needs and goals, and know what questions to ask vendors. Instead of taking a “shop ‘till you drop” approach (where you risk looking forever, but end up with nothing except headaches and wasted resources), check out this how-to guide for successfully finding the right talent management tools to truly implement your company’s vision! Want to learn more? Start with the free white paper from Cornerstone OnDemand.
Tags : 
    
Cornerstone OnDemand
Published By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath
    
Creekpath
Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? A new white paper, “The Five Essential Elements of Next -Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
    
CrowdStrike
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.