vendor solution

Results 226 - 250 of 280Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Aug 08, 2014
Although modern backup solutions can offer significant recovery agility, backup as an IT process is generally less than enough for the data protection goals that IT is being asked to deliver. As IT is embracing snapshots, replication, archiving, and availability mechanisms to enhance business continuity/disaster recovery (BC/DR) preparedness, it is important to realize that there is a better way than piecemealing each component, and then wondering why CapEx and OpEx are so out of line.
Tags : 
vendor, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management
    
HP
Published By: HP     Published Date: Aug 08, 2014
The deduplication is one of the fastest growing segments in storage. Accordingly, every vendor is telling their version of the deduplication story. With emerging technologies, it is difficult for IT managers to determine what the true IT benefits vs. marketing spin are. This brief document discusses several key areas of deduplication and uncovers six NetApp challenges customers should understand when evaluating HP StoreOnce Backup Systems and NetApp as their deduplication solution of choice.
Tags : 
data, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges
    
HP
Published By: HP     Published Date: Sep 04, 2014
Data Intensity is an enterprise cloud services provider focusing on Oracle applications. Founded in 2001, it currently has 240 employees and operates two data centers with about 1,200 virtual servers. They needed a flexible storage platform to handle growth of individual customer applications, such as Oracle ERP, with minimal downtime with low operating costs. Testing included storage systems from five different vendors to find a solution that was easy to administer and provides thin provisioning, snapshots, and rapid provisioning.
Tags : 
3par, storage, data, cloud, oracle, data intensity, virtual, solution
    
HP
Published By: IBM     Published Date: Oct 22, 2013
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : 
ibm, info-tech, quality management, test champion report, microsoft, parasoft, software testing, vendor selection
    
IBM
Published By: Marketo     Published Date: Jun 03, 2014
The marketing automation platform (MAP) market is rapidly changing, and businesses that "get it" know that marketing automation is essential to their long-term success. In fact, in the 2014 update to the SiriusView for Marketing Automation Platforms report, SiriusDecisions suggests that marketers who do not use and understand marketing automation are quickly becoming a dying breed. In essence, marketing automation is here!
Tags : 
marketo, marketing automation, marketing automation vendors, map, marketing automation platform, lead generation, crm solutions, lead nurturing
    
Marketo
Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global
Published By: Crownpeak     Published Date: Jul 31, 2015
With today's ever-increasing demand for a seamless customer experience, the website has become a primary influencer for buyers. The Gartner Magic Quadrant for Web Content Management provides an in-depth analysis of leading vendors, guiding companies that are in the process of evaluating a Web Content Management solution for their business.
Tags : 
crownpeak, gartner, gartner magic quadrant, web content management, wcm, saas, cloud
    
Crownpeak
Published By: Crownpeak     Published Date: Feb 09, 2016
With today's ever-increasing demand for a seamless customer experience, the website has become a primary influencer for buyers. The Gartner Magic Quadrant for Web Content Management (WCM) provides an in-depth analysis of leading vendors, guiding companies that are in the process of evaluating a Web Content Management solution for their business.
Tags : 
crownpeak, gartner, gartner magic quadrant, web content management, wcm, saas, cloud
    
Crownpeak
Published By: Crownpeak     Published Date: Sep 29, 2016
The Gartner Magic Quadrant for Web Content Management (WCM) provides an in-depth analysis of leading vendors, designed to help guide companies that are in the process of evaluating a Web Content Management solution for their business. For the third year in a row, Gartner has recognized Crownpeak as a "Visionary" on its 2016 Magic Quadrant for Web Content Management. The report is an invaluable tool for gaining a better understanding of the industry's leading WCM solutions and their strengths. Crownpeak recently added Digital Quality Management to its platform, making us the only WCM with automated monitoring for flagging errors and inconsistencies. Enjoy a complimentary download on us!
Tags : 
crownpeak, gartner, magic quadrant, web content management, wcm, digital quality management, digital experience management
    
Crownpeak
Published By: Gold Lasso     Published Date: Oct 02, 2007
Many email marketers look for the lowest price point and equate that to the best value, but the lowest cost may not be the best value. Understanding how Email Service Providers determine price and what features you're paying for is an important part of being a successful email marketer.
Tags : 
marketing, email marketing, vendors, esp, esps, marketing solutions, vendor selection, gold lasso
    
Gold Lasso
Published By: Aladdin     Published Date: Aug 21, 2009
This in-depth 14-page white paper explains all available anti-spam techniques and how they are used by eSafe. It also includes a "Dare to Compare" competitive matrix for easy vendor/solution selection.
Tags : 
spam, anti-spam, anti spam, comparison guide, comparison chart, comparison table, email security, anti-spam software
    
Aladdin
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plants overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
    
Aventail
Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics
    
OutlookSoft
Published By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : 
iscsi, storage management, storage scalability, scalable storage, scalability, multi tiered, multitiered, sbe
    
SBE
Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving, storage, storage management
    
Symantec
Published By: Gold Lasso     Published Date: Oct 02, 2007
Many email marketers look for the lowest price point and equate that to the best value, but the lowest cost may not be the best value. Understanding how Email Service Providers determine price and what features you're paying for is an important part of being a successful email marketer.
Tags : 
marketing, email marketing, vendors, esp, esps, marketing solutions, vendor selection, gold lasso
    
Gold Lasso
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Dec 28, 2007
With any technology, the vendor's job is to try to sell you their product, and they may rely on promises, superlative language and sparkling product demos to try to sway you. And with the midmarket ERP landscape crowded with players vying for your business's dollar, the prospect of choosing the right solution can seem even more daunting. But armed with these 10 questions, you'll be able to see through the hype and narrow down a few vendors that can really deliver what you need.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection
    
InsideCRM.com
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: SAP     Published Date: Mar 29, 2011
Consider issues as to why IT projects are at a risk to run late, over budget and not meet the goals. To address these concerns, software and service vendors are creating packaged solutions resulting in smaller, modularized implementations. Read how your company can benefit from packaged solutions.
Tags : 
packaged solutions, sap deployment solutions, saas, project management, manufacturing execution systems
    
SAP
Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
Focus
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.