research report

Results 451 - 475 of 508Sort Results By: Published Date | Title | Company Name
Published By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
forrester, enterprise, data, technology, best practices, innovation, security, business integration
    
SnowFlake
Published By: SocialFlow     Published Date: Oct 30, 2014
Research shows that Data-Driven Social Media publishing delivers a 91% increase in reach and a 26% increase in engagement. This report is based on 1.6 M posts on Facebook, Twitter and Google Plus, and proves that how you distribute your social posts is more important to improving your engagement than what youre posting.
Tags : 
social media, social media management, social performance, social best practices, social publishing, social media results, earned media, facebook results
    
SocialFlow
Published By: Spredfast     Published Date: Aug 24, 2018
Social listening can sometimes feel like swimming blind. But it actually is easier than it seems. Follow our research team as they explore social listening reports to determine the gap between what finserv audiences are looking for versus what finserv companies are providing.
Tags : 
social video, video marketing, video content, video content marketing, social media video, online video marketing, video marketing strategy, social media video marketing
    
Spredfast
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
In Q1 2014, Spredfast commissioned research from Forrester Consulting to uncover insights on the state of enterprise social marketing programs at the biggest companies across the U.S. and Western Europe. With input from 160 Director-level or above leaders in companies with $1 Billion or above in revenue, this first-of-its-kind research report surfaced corporate social marketing trends and insightful benchmarks for consideration in 2014 planning and beyond.
Tags : 
spredfast, social marketing, forrester, corporate social marketing, marketing trends, business value, social media, integration of social marketing
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
In Q1 2014, Spredfast commissioned research from Forrester Consulting to uncover insights on the state of enterprise social marketing programs at the biggest companies across the U.S. and Western Europe. With input from 160 Director-level or above leaders in companies with $1 Billion or above in revenue, this first-of-its-kind research report surfaced corporate social marketing trends and insightful benchmarks for consideration in 2014 planning and beyond.
Tags : 
spredfast, social marketing, forrester, corporate social marketing, marketing trends, business value, social media, integration of social marketing
    
Spredfast, Inc.
Published By: Sprinklr     Published Date: Feb 28, 2018
"Analyze This highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester and Sprinklr say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
research reports, analyst reports, marketing technology, forrester wave, forrester wave reports, report, marketing trends. trends, marketing
    
Sprinklr
Published By: SPSS     Published Date: Jun 30, 2009
If you are currently involved in survey research, then you need to read this report now!
Tags : 
spss, spss survey tips, survey research, surveys, marketing research, sample size, statistics, statistical research
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
If you are currently involved in survey research, then you need to read this report now!
Tags : 
spss, spss survey tips, survey research, surveys, marketing research, sample size, statistics, statistical research
    
SPSS, Inc.
Published By: Stripe     Published Date: Jun 11, 2019
Analyst firm 451 Research interviewed 500 businesses and 1,000 consumers and found that Europe's online economy risks losing 57 billion when Strong Customer Authentication (SCA) goes into effect on 14 September. SCA is intended to reduce fraud rates and enhance the overall security of online payments. But what does this mean for businesses and how can they best accommodate these new requirements in order to limit the financial impact? Download the report to find out.
Tags : 
sca, online economy, online payment
    
Stripe
Published By: Success Factors     Published Date: Aug 02, 2012
This free Ventana Research report shows SuccessFactors to be a top supplier of applications that support the management and operations of compensation. According to Ventana, SuccessFactors Compensation (part of SuccessFactors BizX Suite) achieved the top overall ranking due to its scores in Reliability and Capabilities. In addition, the growing number of SuccessFactors customers and the company's commitment to cloud computing contributed to its top ranking in the Validation and TCO/ROI categories. Easy for managers at all levels to use, the application has capabilities for compensation reviews and adjustments, as well as an embedded analytic view-which shows the handling of promotions and support across pay ranges. Find out what else Ventana has to say about SuccessFactors in this complimentary report. Download it today.
Tags : 
successfactors, sap, ventana research, value index, total compensation management, benchmark research, human capital, vendors
    
Success Factors
Published By: Success Factors     Published Date: Oct 07, 2014
Few things matter more to business success than human capital. The right mix of people, skills, and culture can create competitive advantage for companies, reshape industries, and drive prosperity across regions. As a new generation joins the labor market and employment options evolve in an increasingly global and knowledge-based economy, effective workforce management is a strategic imperative. Opportunities abound in this new environment, for both employers and employeesbut so do risks.
Tags : 
successfactors, talent, human capital, labor market, employment, employees, employers, knowledge based economy
    
Success Factors
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and the largest of the pure-play talent management vendors (The Forrester Wave: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: SumTotal Systems     Published Date: Jan 19, 2017
In this report, we provide an overview of the learning management systems (LMSs) market, along with a guide to help you in selecting this type of system for your company. The research on which this report is based was conducted between July and December 2013.
Tags : 
sumtotal systems, lms, learning management systems, lms marketplace
    
SumTotal Systems
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organizations security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of todays best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
Symantec Positioned as a Leader in Independent Research Firm Report Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave: Endpoint Security, Q1 2013 and remains a good choice in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new Digital Industrial Transformation with the Internet of Things report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : 
industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains
    
T Systems
Published By: Taleo     Published Date: Apr 15, 2009
Alignment Drives Employee Engagement and Productivity: By a two to one margin, companies surveyed in a Taleo Research study reported the largest risk to their company's bottom line and brand is low employee engagement and productivity.
Tags : 
taleo, human resources, us business, talent, intelligence, business managers, goals
    
Taleo
Published By: Taleo     Published Date: Dec 30, 2009
Integrated Talent Management: Improving Business Results through Visibility and Alignment: Research shows the vast majority of organizations have only achieved integration across two or more elements of talent management, those that have are reporting superior performance gains.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizations DevOps practice, Tenable encourages you to read the Gartner report, 10 Things to Get Right for Successful DevSecOps. Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Researchs analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Researchs analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attackers seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attackers first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.