research

Results 2476 - 2500 of 2525Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
The data that you’ll see throughout this book is the result of a survey commissioned by Lookout and conducted by Enterprise Strategy Group, an integrated IT research, analyst, strategy, and validation firm.
Tags : 
enterprise, mobile, security, survey, commission, lookout
    
Lookout
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 26, 2018
In our 37-criteria evaluation of enterprise health cloud providers, we identified the 10 most significant ones — ClearDATA, CloudMine, IBM, Kinvey, Medable, Microsoft, MphRx, NTT DATA, Salesforce, and SAS — and researched, analyzed, and scored them. This report shows how each provider measures up and helps healthcare CIOs make the right choice.
Tags : 
    
Progress
Published By: HotSchedules     Published Date: Jan 17, 2019
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your generation z employees while keeping your restaurant compliant with today’s labor laws? Research has found generation z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : 
cloud, solutions, ecm, onbase, hyland, data, availability, encryption
    
OnBase by Hyland
Published By: Host Analytics     Published Date: Aug 01, 2017
The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more.
Tags : 
    
Host Analytics
Published By: Host Analytics     Published Date: Aug 02, 2017
"The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more. "
Tags : 
    
Host Analytics
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: Pure Storage     Published Date: Jul 03, 2019
Financial services businesses face unprecedented market challenges. Disruption from Fintech firms, increased local and international regulation, geo- political upheavals and wavering customer loyalty. The need to fully understand the market, to innovate, to reduce costs and be more competitive has never been greater, and this is where AI can help. According to one fintech research company, by 2030 the financial services sector could reduce operational costs using AI, by as much as 22%. It suggests that will equate to around $1 trillion in efficiencies. So, from a purely operational point of view, doing nothing is not really an option for companies that want to remain competitive. Today, financial services firms across the board need to rejuvenate customer experience to protect against client attrition, and protect those customers against risk. While data analysis and visualization are key to making sense of data, the fundamental challenge for all businesses is building an infrastructur
Tags : 
    
Pure Storage
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Dieses White Paper enthält die Ergebnisse einer von CA Technologies in Auftrag gegebenen Studie zur Analyse der Vorbereitungen in Unternehmen im Zusammenhang mit der Erfüllung der Compliance-Anforderungen für die DSGVO. Im Hinblick darauf, dass die DSGVO weitreichende Auswirkungen auf dieDaten hat, die in Umgebungen außerhalb der Produktion verwendet werden, ging es CATechnologies in ersterLinie darum zu verstehen, wie Unternehmen für die DSGVO planen und welcheProzesse und Technologien sie zur Unterstützung benötigen.
Tags : 
research scope, gdpr, business, compliance, technological challenges, customer data, investment, pseudonymization
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA recently partnered with TechValidate to perform a research study that would help us to understand how organizations are leveraging our CA Project & Portfolio Management (CA PPM) solution to evolve their businesses. The study validated the changing role of the modern PMO.
Tags : 
tech, validate, research, study, portfolio, management
    
CA Technologies EMEA
Published By: Quick Base     Published Date: Aug 07, 2017
Many financial leaders struggle to find enough time to do everything needed because they must deal with manual processes and clunky spreadsheets. If you're concerned about wasting time by manually collecting financial data, find out how to conquer spreadsheets with the power of automation. You'll learn key trends and insights backed by research and hear real-world examples and best practices for financial automation. You'll come away with the practical tips and inspiration you need to improve team performance, mitigate financial risk, and increase business impact.
Tags : 
    
Quick Base
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Oct 02, 2019
Would you like a live demonstration of the Forcepoint product portfolio, tailored to your security questions and requirements? Our representatives can show you the capabilities of the most appropriate product(s) for your situation, answer your questions and provide additional material to support your research. If you would like a live demonstration, please fill in the form opposite and one of our representatives will contact you shortly to discuss your requirement.
Tags : 
    
Forcepoint
Published By: Oracle OMC     Published Date: Nov 30, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle OMC
Published By: Infosys     Published Date: Feb 07, 2019
Examining trends identified by 5,000 shoppers that provide guideposts for setting a strategic course for growth.
Tags : 
    
Infosys
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable
Published By: BigCommerce     Published Date: May 30, 2018
To find the right ecommerce platform, Freund Containers spent years of research and hours evaluating a wide variety of qualifiers on different platforms. To solve their problems, they created an on-premise-like customizations for their B2B business saving money and time. “The open API and the use of custom fields makes BigCommerce extremely flexible and the platform can do virtually anything you want it to do.” Chris Hiller, General Manager, Freund Container Read their story.
Tags : 
    
BigCommerce
Published By: Google Chrome Enterprise     Published Date: Feb 14, 2018
xxx
Tags : 
    
Google Chrome Enterprise
Start   Previous    87 88 89 90 91 92 93 94 95 96 97 98 99 100 101    Next    End
Search