Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

analysis

Results 351 - 375 of 1283Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
    
IBM
Published By: OracleSMB     Published Date: Jan 04, 2018
Finance has grown beyond recording and reporting. Leaders in fast-growing companies need not only the raw financial data, but the sophisticated analysis to make sense of it all. In today’s digital world, Finance must move out of the back-office and help drive the direction of the business, as well as improve the bottom line through more efficient processes and increased responsiveness. With the right tools, your finance team can simplify processes and fulfill its goal of adding value.
Tags : 
    
OracleSMB
Published By: LogMeIn     Published Date: Feb 27, 2018
Most customer engagement solutions on the market require complex data analysis and months of implementation before you start seeing results. But Bold360 ai uses Natural Language Understanding to start learning your customers’ needs from the very first interaction. Its smart routing capability directs customers to the best resource available, and captures data in an intuitive dashboard. Start seeing results now with Bold360 ai.
Tags : 
bold360, engagement, customer, market, data, analysis
    
LogMeIn
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: SEMrush     Published Date: Nov 29, 2018
In highly competitive environments like the modern marketplace, obtaining accurate and timely data can make real the difference between keeping tabs on, getting ahead of, or being left behind the competition. Download now to learn more!
Tags : 
seo, semrush, e-commerce, market analysis, strategy
    
SEMrush
Published By: SEMrush     Published Date: Nov 30, 2018
The end of 2017 provides an opportunity to identify strong and weak points of your current activities as well as determine necessary changes in the strategy of your online store. The increasingly competitive world of e-commerce challenges companies and makes them adjust their marketing strategy to an ever changing market. So how does your online business compare with other businesses in your industry?
Tags : 
seo, semrush, e-commerce, market analysis, strategy
    
SEMrush
Published By: SEMrush     Published Date: Nov 30, 2018
No matter how many “common rules” and “universal laws” of SEO have been invented over the years, certain tasks require a unique approach. At SEMrush, we use your feedback as the main source of insights and ideas for our future tools. We thoroughly analyse our customers’ workflow so that the tools we build are of maximum value to their users.
Tags : 
seo, semrush, e-commerce, market analysis, strategy
    
SEMrush
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
    
Group M_IBM Q2'19
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional, security, small business, vendors, malware
    
ESET, LLC.
Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security, managed service, managed services, network security, email security software, managed email security, skeptic, email, email security solution, mta, convergence, network management, cloud computing
    
Symantec.cloud
Published By: Active Power     Published Date: Aug 30, 2011
This paper provides an analysis of the reliability of Active Power's flywheel-based UPS system vs. a battery-based double-conversion UPS system.
Tags : 
flywheel, ups, double conversion, batteries, ups, reliability, backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems, ups backup power, ups power supply, data center
    
Active Power
Published By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : 
sales, sales planning, business management
    
Xactly
Published By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
    
T Systems
Published By: Schneider Electric     Published Date: Feb 17, 2017
This white paper provides a quantitative TCO analysis of the two architectures, and illustrates the key drivers of both the capex and opex savings of the improved architecture.
Tags : 
data center, power, cooling, data center architecture, power and cooling infrastructure, tco, total cost of ownership
    
Schneider Electric
Published By: VMware Dell     Published Date: Jul 02, 2008
In this case study, you'll discover the tangible benefits to IRMC when they used VMware Virtual Desktop Infrastructure to virtualize their call center operations and support multiple call centers from a central data center. Their IT staff achieved increased flexibility, faster provisioning, redeployed IT staff, reduced IT costs, and improved competitiveness. Finally, review a detailed financial analysis to back up IRMC's 73% annual ROI, and see how they saved.
Tags : 
call center, vmware, virtual, virtualization, virtual machine, callcenter, it savings, cost savings, flexibility
    
VMware Dell
Published By: BMC ESM     Published Date: Nov 09, 2009
Gartner assesses the vendor landscape in their latest Magic Quadrant for IT Event Correlation and Analysis, and positions BMC in the Leaders' Quadrant. Read the report
Tags : 
bmc esm, magic quadrant, consolidation, eca, event correlation and analysis, business service management, event management, deduplication
    
BMC ESM
Published By: SAS     Published Date: Nov 10, 2014
Learn about the four benefits of interactively creating, running, and evaluating high-performance analytic models and see how this will allow your organization to get a fast, interactive interface without all the tedious experimentation.
Tags : 
sas, visual statistics, analytics, interactive interface, statisticians, business analysis, business management, interactive modeling, descriptive modeling
    
SAS
Published By: Facebook     Published Date: Mar 07, 2012
The following white paper offers an in-depth analysis of how social media brand impressions reach Fans and Friends throughout Facebook, as opposed to just on brand Fan pages.
Tags : 
facebook, social media, emergeing marketing, digital marketing, online marketing, social media marketing
    
Facebook
Published By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : 
eset, virus, scada, plcs, stuxnet, malware, siemens, code
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit, c&c servers, kernel-mode components, firmware
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime
    
ESET
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This informative guide highlights valid reasons for considering a fixed asset solution and offers advice and useful tips for each stage throughout the evaluation process.
Tags : 
fixed asset management solution, ram, evaluation guide, risk analysis assessment, planning, erp, ledger, spreadsheets, legacy system
    
Real Asset Management Inc.
Published By: Adaptive Planning     Published Date: Jul 01, 2011
Learn how you can significantly extend the capabilities of your existing Salesforce.com, NetSuite, or other CRM application with an affordable, easy-to-use, and quick-to-deploy solution that automates sales forecasting, improves pipeline visibility, and enables what-if scenario planning.
Tags : 
adaptive planning, salesforce.com, netsuite, crm application, sales forecasting, pipeline, revenue predictability, crm data augmentation, rob hull, greg schneider, sales analysis
    
Adaptive Planning
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.