research report

Results 376 - 400 of 497Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Published By: IBM     Published Date: Nov 04, 2014
Todays consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications can generate unprecedented levels of engagement with customers wherever they are. Find out how to make sure every message they receive is relevantand right on target.
Tags : 
mobile notifications, mobile apps, mobile consumers, site sales, push notification
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness but most who run these programs dont know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, youre going to learn where your peers standand some practical tips on how to get startedeven if you think your data is dirty or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Jan 09, 2015
Early adopters of an extended 360 view will get competitive advantages over their rivals and this will force laggards to adopt a similar approach or lose business.
Tags : 
ibm, big data, insights, mdm, infosphere, data management, dashboards, value
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the markets readiness for Zero Trust concepts and technologies, based on Forresters own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities, compliance, disaster recovery
    
IBM
Published By: IBM     Published Date: May 13, 2016
Download this research report now to learn more about the financial and operational impacts on asset-intensive industries worldwide.
Tags : 
ibm, watson, iot, cognitive asset management, asset management, iot, knowledge management, business intelligence
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud, security, enterprise applications
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Though IP telephony has been available commercially since the mid 90s, it remains an emerging technology for many organizations. Only about 28% of companies have moved all endpoints (handsets, softphones, audio bridges) to IP, according to Nemertes research data. The rest of organizations are either in the process of migrating fully to IP, stuck in a hybrid rollout requiring them to manage typically multiple TDM and IP providers, or firmly planted in TDM. This report reviews the issues and benefits associated with moving to an all-IP environment, based on interviews with IT professionals who have moved to all IP or are in the process of doing so.
Tags : 
    
Cisco
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: Zycus     Published Date: May 29, 2010
Spend Matters research has long considered Hackett Group metrics to be the gold standard of P2P benchmarking. As part of the collaboration for the research for this report, Hackett agreed to share with Spend Matters some of the findings from its latest P2P benchmarks.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction
    
Zycus
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: Esker     Published Date: Jan 08, 2019
AP Data You Should Leverage Positively impact your organization What's in the research report? Access to accurate, real-time data is more important than ever in todays fast-paced business world particularly in a department as important as AP. But what data should you be analyzing to improve performance and make the biggest impact? This research report details KPIs that provide valuable insights to stakeholders and key executives, based on three categories: Operational: track overall efficiency Financial: impact the bottom line Supplier: related to suppliers
Tags : 
    
Esker
Published By: Esker     Published Date: Jul 09, 2019
In the innovation-focused world we live in, businesses that skimp on technology are the first to fall behind the competition. Top-performing enterprises have taken their AP operations to the next level by leveraging technology to streamline the AP process and allow for more strategic activities.This research report explores how best-in-class organizations are using emerging tech to operate AP departments at full potential and details strategies for success in the Age of Intelligence, including: Adopting a customer service-led mentality for AP teams Pursuing holistic & comprehensive AP process automation Integrating more progressive technologies, such as mobility & RPA
Tags : 
    
Esker
Published By: Esker     Published Date: Jul 09, 2019
Digital transformation of P2P processes doesnt just mean using the latest technology to check boxes or implementing automation for automations sake. Rather, it is a philosophy that drives action and brings new levels of speed and efficiency to businesses that choose to embrace it.This 2019 Levvel Research report is equipped with valuable insights and powerful statistics about the digital transformation of P2P cycles and will guide you through topics including: Current P2P practices & where they fall short The evolving state of procurement and AP culture, identity & technology Features & benefits of P2P software solutions
Tags : 
    
Esker
Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android, BlackBerry, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms, security, wireless
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android, BlackBerry, Windows Phone and Nokia Symbian.
Tags : 
tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise, knowledge management, enterprise applications
    
Blackberry
Published By: Box     Published Date: Jul 15, 2013
Gartner research report: Analysis of emerging market for enterprise file synchronization and sharing products and cloud based services.
Tags : 
enterprise file sync, enterprise file sharing, cloud services, file sync, content delivery, service management, cloud computing
    
Box
Published By: SilverSky     Published Date: May 22, 2014
Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers one of the most secure Cloud Business Email services available in the market today. When run on IBM SoftLayer, its also the most reliable. Read the full report.
Tags : 
silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services
    
SilverSky
Published By: OutSystems     Published Date: Jul 15, 2014
This Gigaom Research report defines PaaS, investigates the available options, and then supplies concrete recommendations for what to use where and when.
Tags : 
outsystems, paas, devops, innovation, cloud based solutions, cloud computing, it management, data center
    
OutSystems
Published By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : 
mobile apps, it statistics, mobile trend statistics, mobile app backlog, it management, knowledge management, enterprise applications
    
OutSystems
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.