Skip to main content
 

assessment

Results 1 - 25 of 516Sort Results By: Published Date | Title | Company Name
Published By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection
    
Acronis
Published By: Active Power     Published Date: Aug 30, 2011
This paper provides an analysis of the reliability of Active Power's flywheel-based UPS system vs. a battery-based double-conversion UPS system.
Tags : 
flywheel, ups, double conversion, batteries, ups, reliability, backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems, ups backup power, ups power supply
    
Active Power
Published By: Adobe     Published Date: Oct 24, 2018
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs. This Magic Quadrant is intended for chief marketing of?cers (CMOs), marketing analytics and data science practitioners, and other digital marketing leaders involved in the selection of systems to support marketing analytics requirements.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs.
Tags : 
    
Adobe
Published By: ADP     Published Date: May 04, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 18 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
    
ADP
Published By: ADP     Published Date: May 16, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 27 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
    
ADP
Published By: ADP     Published Date: May 16, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 27 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
    
ADP
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment, asset management, breach prevention
    
AlienVault
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: Allscripts     Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Tags : 
allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional, manual processes, meaningful use, risk management, risk assessment, software updates, secure data, automation, hosted solution, outsourced billing
    
Allscripts
Published By: Aomega     Published Date: Jan 18, 2007
This white paper summarizes Enterprise Video Communications (EVC) and includes a high level plan to perform an EVC assessment helping ensure deployment success.
Tags : 
video conference, video conferencing, video communications, ip networks, video conference, video on demand, aomega
    
Aomega
Published By: AON     Published Date: Aug 29, 2017
There are the obvious things that can affect your organization’s bottom line: sales performance, the economy, overhead. But here’s something you probably didn’t expect: the experience candidates have when they apply to work for your firm—that has an effect too. On Thursday, April 6th at 10AM CT, experts from Aon’s Candidate Selection and Assessment group will discuss how the creation of an incredible candidate experience can be used to foster an energizing candidate experience and how that affects desired business outcomes. Topics of discussion will include: ? The current state of the candidate experience ? How the candidate experience affects an organization’s brand and bottom line ? What candidates are looking for in the assessment process ? What a great candidate experience looks like
Tags : 
    
AON
Published By: Archway     Published Date: Nov 21, 2008
The role of marketing is constantly changing. As budgets shrink and demands grow, marketing departments across the country are being carefully scrutinized for their effectiveness. Top executives are holding marketers more accountable, which means they must not only deliver results, but also find ways to measure the actual bottomline impact of their marketing initiatives.
Tags : 
archway, roi, marketing operations management, outsourcing, business assessments, market planning, product procurement
    
Archway
Published By: Ariba     Published Date: Dec 02, 2010
This assessment tool will compare your performance with that of over 400 procurement professionals surveyed during August and September.
Tags : 
ariba, cpo, free assesment tool, procurement, collaborative business commerce, saas
    
Ariba
Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment
    
ARMA
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation, at&t, att
    
AT&T
Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
    
AT&T
Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
    
AT&T
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.