report

Results 4176 - 4200 of 4445Sort Results By: Published Date | Title | Company Name
Published By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : 
silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email, microsoft exchange, content delivery, messaging
    
SilverSky
Published By: Prophix     Published Date: Apr 24, 2013
Having experienced challenges with spreadsheets and other reporting tools, Porter Airlines Inc. obtained advanced software that would allow them to model complex business problems, including the viability of their air routes, and analyze the health of their growing operations.
Tags : 
case study, projection, spreadsheet, data, reporting, modeling, application integration, application performance management, best practices, business activity monitoring, business analytics, business integration, business intelligence, business management, business metrics, business process management, change management, corporate governance, customer satisfaction, customer service
    
Prophix
Published By: HP and Intel      Published Date: May 02, 2013
This report will explain what virtualization is, and highlight how it is optimizing the performance, both from an IT and business perspective across servers, storage and end user desktops. This report will define how top performing companies gain business advantages from virtualization technologies and outline key changes that must take place for C-Level managers to gain the fruits of the new IT.
Tags : 
    
HP and Intel
Published By: HP and Intel      Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel
Published By: HP and Intel      Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization, application integration, application performance management, best practices, cloud computing
    
HP and Intel
Published By: Payscale, Inc     Published Date: Jun 06, 2013
Are your competitors growing and giving raises in 2013? Find out. Download PayScale's free 2013 compensation best practices report.
Tags : 
compensation best practices, compensation, pay raises, bonus, retention strategies, recruiting strategies, skills gap, workforce growth
    
Payscale, Inc
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks
Published By: Salesforce.com     Published Date: Jun 17, 2013
Get the Nucleus Research survey of CRM decision makers, showing the the significant ROI opportunity all organizations should consider regarding mobile and social CRM adoption.
Tags : 
customer relationship management, crm, technology, value matrix, support sales, marketing, customer service, crm solutions, social drives, mobile device, social, it management, wireless, knowledge management
    
Salesforce.com
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security, data security, security intelligence index, security, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, enterprise applications, data management
    
IBM
Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency
    
Siemens
Published By: Eloqua     Published Date: Sep 11, 2013
Just how modern is your marketing?
Tags : 
oracle, modern marketing report, roi, b to b research services, marketing technology
    
Eloqua
Published By: IBM     Published Date: Sep 27, 2013
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace, data integration, infrastructure, design and facilities, power and cooling, green computing
    
IBM
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management, enterprise applications
    
Norse
Published By: Symantec     Published Date: Oct 07, 2014
Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartners Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned. * 10 reports published since 2002; previous titles include the Magic Quadrant for Enterprise Antivirus.
Tags : 
endpoint protection, growth drivers, challenges, vendor position, antivirus, magic quadrant, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks, security
    
Symantec
Published By: Varonis     Published Date: Nov 12, 2013
Verizons longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : 
varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security, data protection, global scale, breach activity, validated breach incidents, collect personal details, hackers, breach statistics, security decisions, exposed data, it deficiencies, access control, web service security
    
Varonis
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, its no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
    
Varonis
Published By: IBM     Published Date: Jan 09, 2014
Today, large organizations are being buffeted by a host of changes, many of them unexpected or unfamiliar. Business information is virtually exploding in size, kind and locale, taxing the abilities of even the most progressive enterprises to keep up. Mobile technologies and business analytics that were once exclusively used by employees with specialized needs and skills are now common across the entire workforce. As a result of all this, IT is bending under the strain of developing and delivering necessary new services while at the same time maintaining core service quality. This report will consider these issues, as well as IBMs position in and efforts around developing next generation enterprise systems solutions, including its System z mainframes, POWER7+ processor-based Power Systems servers and System Storage offerings focused on those areas and use cases.
Tags : 
enterprise systems, system performance, power7+, power systems servers, system storage, it infrastructure, analytics solutions, business analytics, business processes, charles king, pund-it, inc., ibm, infrastructure, power and cooling, data center design and management, cloud computing
    
IBM
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Published By: Cisco     Published Date: Jan 14, 2014
17-page Principled Technologies Report from 7/13. Side by side test migrating blade server ID to a rack server vs HP.
Tags : 
cisco, ucs vs. hp, blade server id, principled technologies report
    
Cisco
Start   Previous    161 162 163 164 165 166 167 168 169 170 171 172 173 174 175    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.