research report

Results 351 - 375 of 496Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
    
Hewlett Packard Enterprise
Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
    
HPE_OMG_7.16
Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors, access control, information management
    
SAP
Published By: SAP     Published Date: Apr 14, 2011
A research report from Business Week on a global survey of executives on Customer Experience; 80% of respondents rate CE as a strategic priority but the majority believe that their company does a poor job at delivering a good customer experience. We will be publishing 4 reports based on this survey as well as interviews with key analysts, influencers and Customers. Here is the first report which you can download and forward to your sales team and customers.
Tags : 
customer experience management, bloomberg businessweek, bbrs, relationship management, customer segmentation, customer retention, business intelligence, customer relationship management
    
SAP
Published By: Oracle     Published Date: Apr 28, 2014
Perfect order fulfillment requires companies to have seamless integration of all supply chain execution (SCE) including, logistics processes from manufacturing, transportation, warehouse, global trade to mobile and RFID. Recent research from Gartner reveals that most supply chain organizations continue to operate as functional silos warehousing, transportation and manufacturing with minimal, if any, process integration and synchronization between execution silos. The Gartner Research report provides key insights into how supply chain and IT leaders can transform logistics by breaking down functional silos, and designing business processes that span, optimize and synchronize across traditional functional domains.
Tags : 
oracle, logistics, value chain execution, silos
    
Oracle
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scopethis better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry     Published Date: Sep 29, 2009
The year 2009 will forever be remembered as a time when the global economy began a painful restructuring amid a cascade of systemic failures -- credit panic, stock market crash, and mortgage meltdown and business contraction. But some smart and able accounting firm decision-makers stand to benefit... if they can catch the right trends. In this research report, we examine five of the critical issues that are creating new opportunities for the accounting profession and nine key strategies for obtaining competitive advantage.
Tags : 
blackberry, accounting, cpa, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 23, 2010
With sleek designs and a variety of user-friendly features, smartphones have implanted themselves on the public's consciousness-so much so that one leading industry research firm reports that a record 54.5 million such mobile devices were shipped in the fourth quarter last year. With sales rising nearly 40 percent over the same quarter in 2008, the message is clear: Smartphones are hot, and not just for mobile workers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry
Published By: Ensight     Published Date: Dec 03, 2008
Hampered by a time consuming approach to delivering their reports, the team of financial markets research analysts at Rand Merchant Bank needed to find a distribution method that could cope with the growing popularity and performance demands of their research service.
Tags : 
ensight, financial markets research, rand merchant bank, email management tool, research mailings, ecrm
    
Ensight
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk, application security, auditing, internet security, network security appliance, security management, web service security
    
Iovation
Published By: SAS     Published Date: Mar 19, 2013
A Research Report Detailing How Organizations are Using Data Visualization to Succeed with Big Data
Tags : 
big data, visualization, interactive, data, data visualization, application integration, business activity monitoring, business analytics, business intelligence, business metrics, risk management
    
SAS
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management
    
CarbonBlack
Published By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into whats happening in AP, including insights on: How the role of AP is continuously evolving Key drivers that shape AP leaders plans and priorities How automation technology is impacting AP Operational benchmark statistics and recommended strategies
Tags : 
epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy
    
Esker
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies
    
Conductor
Published By: IBM     Published Date: Oct 24, 2013
This analyst research paper contains findings from Aberdeen Group on the financial reporting pressures, challenges faced by organizations particularly with regulatory mandates
Tags : 
ibm, aberdeen group, financial reporting pressures, financial challenges, analyst insight, disclosure management, organizational transparency, organizational collaboration, deman for data, utilize the data, business intelligence, real-time data initiatives, real-time financial reporting, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 04, 2014
Today, as customers increasingly turn to digital channels to research products, shop, and purchase and as employees arrive in the workplace conditioned by engaging consumer Web, mobile, and social experiences organizations can't afford to be left behind because of legacy investments. Customers and employees alike expect an exceptional digital experience. The good news, as our TCO study shows, is that most organizations can justify the cost of IBM's Exceptional Digital Experience solutions based on quantifiable hard dollar savings within a relatively short period of time. Read this IDC Report to learn more about IBM's Exceptional Digital Experience Solutions
Tags : 
ibm, idc, digital experience, digital marketing, customer engagement, web marketing, mobile marketing, social media, tco, customer engagement
    
IBM
Published By: Adobe     Published Date: Nov 05, 2014
The more consumers interact with media, the more marketers know about their habits, and the less time they need to plan and guess actions. Mix Optimization Takes Over Planning, a new Forrester Research, Inc. report, shows why its important for marketers to transition to a marketing optimization platform and provides key steps that will help enable the transition.
Tags : 
mix optimization, marketing platform, planning cycles, data collection
    
Adobe
Published By: Adobe     Published Date: Jan 12, 2015
The more consumers interact with media, the more marketers know about their habits, and the less time they need to plan and guess actions. Mix Optimization Takes Over Planning, a new Forrester Research, Inc. report, shows why its important for marketers to transition to a marketing optimization platform and provides key steps that will help enable the transition.
Tags : 
adobe, marketing, mix, optimization, data, analytics, mix, brands, scientific, planning, process, testing, dsp, dmp, programmatic, insights, campaign
    
Adobe
Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, networking, security, it management
    
Incapsula
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
In a second-quarter 2014 Gigaom Research survey of 500 IT decision-makers at large U.S. companies, we identified strategic buyers as those who report using cloud resources for new business and revenue streams as opposed to those who dont.
Tags : 
backup and recovery, best practices, it spending, return on investment, productivity, cloud computing
    
Dell Cloud Marketplace
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : 
siem, esg, jon oltsik, golden hour, attack detection and incident response
    
Intel Security
Published By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a companys botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : 
cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications, it career advancement
    
BitSight Technologies
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.