analyst

Results 1 - 25 of 729Sort Results By: Published Date | Title | Company Name
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
Hear from IDC analyst Mickey North Rizza and an SAP's Neil Krefsky as they discuss what intelligent ERP is, how it will impact your business, and how to get started. We will cover how an intelligent ERP will help to to: Reduce complexity within your enterprise Speed up decision making and time to value Bring machine learning to the finance function
Tags : 
    
SAP EMEA Global
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. Its become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the companys foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartners 2017 prediction that through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS dont experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
    
CloudHealth by VMware
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload. By integrating the IBM Resilient SOAR Platform with IBM QRadar Security Intelligence, security teams can build out a market leading threat management solution that covers the detection, investigation and remediation of threats across a wide range of cyber use cases.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Analyst whitepaper by Ovum: Hybrid IntegrationPlatforms: Digital Business Calls for Integration Modernization and Greater Agility - Exploring the factors driving hybrid integration platform adoption
Tags : 
    
Group M_IBM Q4'19
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micros own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: Sep 05, 2019
EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed. Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: Strategic insight into the current state of threat detection and response, providing you with ESGs comprehensive research and findings. Current challenges affecting todays organizations, including the time and resources required and numerous gaps that EDR exposes. Valuable foresight into whats next and how XDRdetection and response across email, endpoint, servers, cloud workloads, and networkcan help solve these issues.
Tags : 
    
Trend Micro
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. Its a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business, a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: Key server purchase criteria How top brands directly compare How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel to learn more.
Tags : 
    
Dell EMC
Published By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. A data scientist in the business development team analyzes data to create customized experiences for premium customers. A digital marketer tracks and influences the customer journey for prospective mortgage customers. A risk analyst builds risk models for the banks loan portfolios. A data analyst examines data about local customers. A technical architect defines a new system to protect bank data from internal and external cyberthreats. An application developer builds a new mobile app for online customer portfolio management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
    
SAS
Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo esto apostando muito em inteligncia artificial e machine learning para lhes dar a vantagem tecnolgica necessria para obter servios bancrios em tempo real, personalizados e preditivos. Um marco ajudar a diferenciar os primeiros ganhadores e fornecer vantagens contnuas em inteligncia. Faa o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo esto se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que voc conhecer: 8 tendncias que refletem o nvel de preparao do banco para a inteligncia conectada 9 armadilhas para evitar e 9 maneiras de pular os obstculos Os elementos bsicos pessoais, preditivos e em tempo real da IA e ML para os bancos Lderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso Orientao essencial do IDC para os bancos lderes
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo estn apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnolgica que necesitan para ofrecer servicios bancarios ms personalizados, predictivos y en tiempo real. Un marco ayudar a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitir conocer cmo los mejores bancos del mundo se estn volviendo ms personales, ms predictivos, y ms en tiempo real que nunca. Lo que usted conocer: Las ocho tendencias que reflejan el nivel de preparacin de los bancos para la inteligencia conectada Los nueve obstculos que evitar y las nueve formas de salvar las brechas Los elementos bsicos personales, predictivos y de tiempo real de la IA y el ML para los bancos Los lderes destacados de acuerdo con la investigacin de IDC Financial Insights y sus respectivos casos de uso Una gua esencial de IDC para los bancos lderes
Tags : 
    
TIBCO Software
Published By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was one way or another getting into the cloud. Theres been a shift in customers pri
Tags : 
    
Red Hat
Published By: CFA Institute     Published Date: Oct 07, 2019
Performance evaluation is coming of age. Once a narrow, back office role focused solely on crunching returns, it has become ever more integrated into the DNA of investment firms. Both internally and externally, performance evaluation adds value, helping senior management make key judgement calls where the difference between the right solution and the wrong solution is the difference between growth or decline. The performance analyst of the future will provide valuable input into nearly every area of an investment firm. What began as a mathematical taskcalculating investment returnsis morphing into something much broader. The objective of performance evaluation today is determining what is behind the return being analyzed. What were the key driversallocation or selection? What risk was taken to achieve the return? Was it skill, or was it luck, that produced the return?
Tags : 
    
CFA Institute
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications
    
Virtela Communications, Inc.
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Todays C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in todays complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access connectivity aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo
    
ASG Software Solutions
Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a Goldilocks for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. Theyll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. Well dive into Zeeks creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 24, 2019
A huge array of BI, analytics, data prep and machine learning platforms exist in the market, and each of those may have a variety of connectors to different databases, file systems and applications, both on-premises and in the cloud. But in todays world of myriad data sources, simple connectivity is just table stakes. Whats essential is a data access strategy that accounts for the variety of data sources out there, including relational and NoSQL databases, file formats across storage systems even enterprise SaaS applications and can make them all consumable by tools and applications built for tabular data. In todays data-driven business environment, fitting omni-structured data and disparate applications into a consistent data API makes comprehensive integration, and insights, achievable. Want to learn more and map out your data access strategy? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guests, Eric
Tags : 
    
Gigaom
Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
    
Zynapse
Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance
    
Zynapse
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungen sind wertvolle Tools fr Unternehmen aller Gren. Sie ermglichen Kunden die Kommunikation mit Kunden, Interessenten, Mitarbeitern, Partnern und anderen IT-Systemen. Webanwendungen sind naturgem offen, interaktiv und stets zugnglich. In ihrem Bericht beleuchten die Analysten von Frost & Sullivan, welche Anbieter von Web Application Firewalls (WAF) es gibt, wie die aktuelle Bedrohungslage fr Webanwendungen aussieht und wie die Anbieter diesen Bedrohungen durch Skalierung entgegentreten.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Wir haben alle unsere persnlichen Lieblingsapps. Aber knnen Sie auch nur drei mobile Websites nennen, die Ihnen gefallen? Wohl nicht. Und das liegt daran, dass die Nutzererwartungen allzu hufig enttuscht werden, wenn Webdesigns, die fr Desktop-PCs konzipiert wurden, fr Mobilgerte nachgerstet werden. Dennoch ist der Smartphone-Traffic hher denn je und steigt weiter an. Dieser Bericht von Forrester-Analysten zeigt, warum es hchste Zeit fr einen radikalen Neuanfang ist und wie Ihre Website mit leuchtendem Beispiel vorangehen kann. Laden Sie den Bericht heute noch herunter.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.