research now

Results 26 - 50 of 184Sort Results By: Published Date | Title | Company Name
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
This research paper argues that it is up to the CFO to work with IT to modernize the business before it is too late. Enterprises need greater transparency into the streams of data illuminating market opportunities and market risks. They need systems that scale in step with the organizations growth and technologies assisting a more intimate customer relationship. This paper highlights five reasons why the CFO must lead the charge to modernize their organizations nowor risk being outrun by the competition.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite, it management
    
Netsuite DWASF Leads Display Q1 2015
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Researchs analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Researchs analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attackers seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attackers first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Aug 15, 2018
"Whats your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organizations vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organizations vulnerability discovery process is and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isnt the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper well explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, digital streaming, video on demand, vod, video delivery, over the top content delivery
    
Limelight
Published By: Avanade DACH     Published Date: May 08, 2018
While theres no hotter topic at the intersection of business and technology than AI, Avanade research shows that 88% of global business and IT decision-makers say they dont know how to use AI, and 79% say that internal resistance limits their implementation of it. It doesnt have to be this way. Human-centered AI, which focuses on augmenting the workforce to improve customer and employee experiences, can contribute directly to achieving business goals. This point of view discusses the ways your organization can take advantage of a human-centered AI approach, including redefining jobs and creating a digital ethics framework.
Tags : 
    
Avanade  DACH
Published By: Workday Nordics     Published Date: Feb 01, 2019
"New research reveals theres a digital disconnect in many organisations with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: 80% say they cant integrate new digital solutions with existing finance and HR processes, or it requires effort to do so 80% say they cant get real-time forecasts and dashboards, or it requires effort to do so 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale and avoid the dreaded digital deadlock. "
Tags : 
workday, workforce technology, digital strategy
    
Workday Nordics
Published By: Workday UK     Published Date: Jan 31, 2019
New research reveals theres a digital disconnect in many organisations with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: 80% say they cant integrate new digital solutions with existing finance and HR processes, or it requires effort to do so 80% say they cant get real-time forecasts and dashboards, or it requires effort to do so 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"This paper provides guidance to organizations interested in researching Oracles SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is current understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specification
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Workday UK     Published Date: Mar 20, 2019
New research reveals theres a digital disconnect in many organisations with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: 80% say they cant integrate new digital solutions with existing finance and HR processes, or it requires effort to do so 80% say they cant get real-time forecasts and dashboards, or it requires effort to do so 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Feb 04, 2019
New research reveals theres a digital disconnect in many organisations with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: 80% say they cant integrate new digital solutions with existing finance and HR processes, or it requires effort to do so 80% say they cant get real-time forecasts and dashboards, or it requires effort to do so 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday Netherlands     Published Date: Mar 20, 2019
New research reveals theres a digital disconnect in many organisations with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: 80% say they cant integrate new digital solutions with existing finance and HR processes, or it requires effort to do so 80% say they cant get real-time forecasts and dashboards, or it requires effort to do so 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Gigamon     Published Date: Feb 20, 2019
Download How to Strengthen Security While Optimizing Network Performance to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: Briefly cover security research challenges in todays threat landscape Explain why DNS resolution data is a rich resource for security research Describe how Akamai teams use DNS data and data science to create better threat intelligence Discuss improvements in threat coverage, accuracy, and responsiveness to todays agile threats
Tags : 
    
Akamai Technologies
Published By: Carbonite     Published Date: Oct 12, 2017
Research Now, a leading global research firm, recently surveyed 200 IT decision makers to compare satisfaction levels among four different backup and recovery solutions. Carbonite backup and recovery powered by EVault technology received the top ratings in several categories, including reliability and ease of use. Overall, Carbonite ranked #1 in five of the eight factors IT pros said were most important to them.
Tags : 
evault technology, reliability, recovery, ease of use, research now
    
Carbonite
Published By: Sage Software (APAC)     Published Date: Nov 28, 2018
91% of shoppers research products online before making a purchase in a brick-and-mortar store. To remain competitive and grow, it's now imperative for retailers to deliver a seamless shopping experience across all channels. Download our new whitepaper to find out how an Enterprise Management solution can help you deliver the experience today's customer expects.
Tags : 
    
Sage Software (APAC)
Published By: Gigamon     Published Date: Dec 13, 2018
Read How to Strengthen Security While Optimizing Network Performance to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by reading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Download How to Strengthen Security While Optimizing Network Performance to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Download How to Strengthen Security While Optimizing Network Performance to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when its a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
Tags : 
    
Rackspace
Published By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeens research shows that 90% of Best-in-Class marketers report fueling lead generation efforts with content marketing. What do you need to know to follow this best practice of the Best-in-Class? Thats exactly what this Knowledge Brief is intended to uncover.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Todays security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. Well discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Concur     Published Date: May 07, 2012
Many organizations are looking for opportunities to reduce costs across the enterprise. Research shows that 7 to 10 percent of the average organization's budget is spent on expenses related to travel and entertainment (T&E), so now is the time to take a better look at this large area of spend.
Tags : 
concur, finance, business, travel and expense management, budget
    
Concur
Published By: EMC Corporation     Published Date: Jul 07, 2013
While the concept of big data is nothing new, the tools and technology and now in place for companies of all types and sizes to take full advantage. Enterprises in industries such as media, entertainment, and research and development have long been dealing with data in large volumes and unstructured formats - data that changes in near real time. However, extracting meaning from this data has been prohibitive, often requiring custom-built, expensive technology. Now, thanks to advancements in storage and analytics, all organizations can leverage big data to gain the insight needed to make their businesses more agile, innovative, and competitive.
Tags : 
big data, emc, technology, storage, analytics, data management, security, knowledge management, platforms
    
EMC Corporation
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and the largest of the pure-play talent management vendors (The Forrester Wave: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.