research report

Results 1 - 25 of 507Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: Important cyber security risks The impact of a data breach to your organization Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Real estate and facilities executives work across a broad agenda, from supporting business growth to improving building performance. Where should technology fit in and when is the right time to review your options?Independent research firm, Verdantix, explores the multiple trends profoundly changing real estate management and driving the need for a refreshed technology strategy. Download your complimentary report and learn more.
Tags : 
    
Group M_IBM Q4'19
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizations DevOps practice, Tenable encourages you to read the Gartner report, 10 Things to Get Right for Successful DevSecOps. Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Focus     Published Date: May 13, 2009
A network upgrade is necessary; however, you need everyone to agree. Get the help to sell it. Download your FREE research report now.
Tags : 
information technology, networking, infrastructure, internetworking hardware, it spending, total cost of ownership
    
Focus
Published By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : 
cloud, service, research, cisco, global, impact survey, business enabler, adoption of new technology
    
Cisco
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security
    
Symantec
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and the largest of the pure-play talent management vendors (The Forrester Wave: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: Salesforce.com     Published Date: Sep 16, 2013
New Gartner research positionssalesforce.comin the Leaders Quadrant for Sales Force Automation. Download the 2013 Gartner Magic Quadrant Report and find out what Gartner analysts have to say about Salesforce.
Tags : 
gartner, salesforce.com, leaders quadrant, automation, report, best practices, cloud, enterprise applications
    
Salesforce.com
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod
    
IBM MaaS360
Published By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for todays sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 1218 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Puppet     Published Date: Jun 24, 2016
The fifth annual State of DevOps Report, presented by Puppet and DevOps Research & Assessment (DORA), confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations and its an investment that can deliver powerful returns. This years report shows how DevOps speeds up delivery, improves quality and security, enhances employee engagement and more. Download the report to learn why: High-performing IT organization experience 200x more frequent deployments and 24x recovery from failures. High performers spend 22 percent less time on unplanned work and 29 percent more time on new work, such as features or code. Taking an experimental approach to product development improves IT performance. The report also helps you understand the ROI of DevOps, and includes formulas to quantify your potential cost savings, using metrics from you own organization.
Tags : 
    
Puppet
Published By: QTS     Published Date: Feb 04, 2016
Download Vormetrics Annual Data Threat Report, featuring key insights from 451 Research, to learn more about the latest trends in data encryption and data security and how your business can best protect its most vital asset: its data.
Tags : 
vormetric, 451 research, data encryption, data security, threat report, security, data management
    
QTS
Published By: Ahead     Published Date: Nov 30, 2018
Over the past seven years, weve surveyed more than 30,000 technical professionals around the world to explore the relationships between ITperformance, DevOps practices, culture, organizational performance and other elements that affect business outcomes. In the process, weve built the deepest and most widely referenced body of DevOps research available. The 2018 State of DevOps Report breaks new ground in our understanding of the DevOps evolutionary journey. We have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.
Tags : 
    
Ahead
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Blue Medora     Published Date: Oct 24, 2016
a recent Forrester Consulting research report shows that tools creep and lack of visibility are big problem areas for companies. Additionally, the research showed that only 24 percent of companies could provision infrastructure in a matter of hours instead of days or weeks.
Tags : 
it operations, blue medora, visibility, cloud management, open-source databases, infrastructure provisioning
    
Blue Medora
Published By: Interactions     Published Date: Feb 27, 2019
The quality of a customer care strategy can make or break a company. Simply resolving a customer service issue or complaint is no longer enough in a compettve, customer-obsessed environment, there is always room for improvement. In a recent research report on Customer Efort, Interactons found that customers simply arent willing to spend a lot of tme getng their issues resolved. Thats why brands today need to design a modern customer care strategy that not only addresses their customers needs, but also removes efort and frustraton. And do all of this while reducing the ever increasing cost and complexity of customer care. So how do you get started with developing a successful customer care strategy? Weve outlined 4 steps that address the major points you need to consider when building a customer care roadmap.
Tags : 
    
Interactions
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: 451's overview of AlienVault USM Anywhere A brief look at the history of AlienVault How USM Anywhere compares to competitors A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the zero trust concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrifys Zero Trust Security approach, as well as explores its Next-Gen Access platform, which provides a solid foundation for enterprises setting out on their zero-trust journey.
Tags : 
    
Centrify Corporation
Published By: OC Tanner     Published Date: Oct 10, 2019
Improving workplace culture is an ongoing priority for most organizations. But company culture can be an ever-moving target, and the modern workforce evolves every day. Not getting culture right can lead to time and resources spent on initiatives that dont have an impact or improve the employee experience. Brand new research from the 2020 Global Culture Report* shows 5 new insights about workplace culture that most organizations miss but need to know about.
Tags : 
    
OC Tanner
Published By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeens research shows that 90% of Best-in-Class marketers report fueling lead generation efforts with content marketing. What do you need to know to follow this best practice of the Best-in-Class? Thats exactly what this Knowledge Brief is intended to uncover.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing
    
Aberdeen Group
Published By: Attunity     Published Date: Feb 12, 2019
Read this checklist report, with results based on the Eckerson Groups survey and the Business Application Research Center (BARC), on how companies using the cloud for data warehousing and BI has increased by nearly 50%. BI teams must address multiple issues including data delivery, security, portability and more before moving to the cloud for its infinite scalability and elasticity. Read this report to understand all 7 seven considerations what, how and why they impact the decision to move to the cloud.
Tags : 
cloud, business intelligence, analytics, cloud data, data lake, data warehouse automation tools, dwa, data warehouse
    
Attunity
Published By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : 
best practices, audit, finance, efficiency, productivity, business management
    
IBM
Published By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : 
technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm
    
IBM
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Concur     Published Date: Jan 14, 2013
Where was the most popular place worldwide for business travelers to dine out, drive in or hang their hat in 2011? This report reveals where travelers are spending money, where they arent, and what the state of the industry is at home and abroad.
Tags : 
business expense, cloud expense management, cloud expense reporting, expense best practices, expense management, expense management best practices, expense management report, expense management research
    
Concur
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.