rest

Results 1 - 25 of 1899Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales. Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, unified commerce, payment convenience, global payments technology, e-retail, pos technology
    
Global Payments
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Intel     Published Date: May 21, 2019
Please note that this piece of content is in local language. A Forrester Consulting Thought Leadership Spotlight Commissioned By Intel.
Tags : 
    
Intel
Published By: Intel     Published Date: May 22, 2019
Please note that this piece of content is in local language. A Forrester Consulting Thought Leadership Spotlight Commissioned By Intel.
Tags : 
    
Intel
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBMs deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBMs AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers cant trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The age of digital transformation is firmly here, and with it comes a seismic shift in how businesses must operate if they intend to stay relevant and profitable. Though the role of process in digital transformation is often over-hyped, in truth, it remains a critical element in the fight to win, serve, and retain customers. In this digital age, businesses must holistically reframe their investment in process automation. In short, a compelling vision for process excellence must underpin this digital transformation, thereby transforming customerfacing processes and digitizing operational processes. The change is so profound that Forrester has renamed the category from business process management (BPM) to digital process automation (DPA). This shift, while continuing to drive down costs and drive up employee productivity, makes customer experience and digital transformation the primary success factors. This represents a powerful and necessary change of focus. In July 2017, IBM commission
Tags : 
    
Group M_IBM Q2'19
Published By: Genesys     Published Date: Feb 12, 2019
Forrester Research has found that companies that prioritise their customer experience transformation perform better. Companies included in their report, Drive Marketing and CX Convergence with Modern Technology, experienced: 68% increase in revenue 67% improvement in market differentiation 72% acceleration of digital business Delivering customer experiences that produce results like this requires a strategic approach across your company and the ability to turn disparate interactions into a consistent, personalised customer journey. Read this ebook for three strategies that get you started.
Tags : 
    
Genesys
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data protection, data quality
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization, application integration, application performance management, business activity monitoring, business intelligence, business management, business process automation
    
ASG Software Solutions
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware, anti virus
    
Astaro
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
In April 2016, SAP commissioned Forrester Consulting to evaluate how enterprises are taking advantage of IoT, how IoT fits into broader digital transformation initiatives, and the role of immediate insights in realizing the benefits that IoT can deliver.
Tags : 
    
SAP
Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMwares UEM solution, have been assessed. Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: SAP Hybris     Published Date: Oct 26, 2017
The Forrester Wave: B2C Commerce Suites, which identifies the top 13 B2B commerce suite providers and evaluates them on how well they meet the needs of the market.
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
The Forrester Wave: B2C Commerce Suites which identifies the top 11 B2B commerce suite providers and evaluates how they stack up against each other
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
For companies and buyers alike, customer service has traditionally been used as a troubleshooting tool. Forrester found that companies believe that nearly 50% of all buyers still view customer service as a post-purchase resource, rather than a purchasing aid, and in response, companies have positioned their customer service capabilities to match that expectation. However, Forrester conducted a custom survey of 247 companies and found that this reactive, postpurchase-only customer service mindset can result in missed sales opportunities and contributes to greater purchase dissatisfaction.
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
Forresters Total Economic Impact examines the potential cost saving and business benefits of SAP Hybris Cloud for Customer Service
Tags : 
    
SAP Hybris
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.