Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

analyst report

Results 126 - 150 of 167Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Sep 16, 2015
This report details the results of a survey taken from pre-qualified IT decision makers from North America and Europe, and shows how AirWatch by VMware received the highest scores for EMM vendor promise and fulfilment. 950 surveys were completed.
Tags : 
airwatch, vmware, emm, vendor promise, fulfillment, security, it management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : 
airwatch, security, data defense, mobile, emm, it management
    
VMware AirWatch
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365
Published By: Select Hub     Published Date: Nov 07, 2017
Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Unlike some ratings, SelectHub product scores are taken from multiple sources including top analysts and actual buyers of the software—ideal for your shortlist. Find the right BI analytics tools: • Actionable insights from experts: In plain language, find out how each product supports the functions that matter most to your company. • Key requirements criteria: Get a comprehensive list of the key requirements for use in your software evaluation and vendor selection. • Easy pricing: Get recommendations and pricing for solutions matching your business needs. • Includes practical guide: How to Buy Business Intelligence Software Over 80 business analytics and BI tools evaluated. The SelectHub platform contains expert software analysis across key criteria and vendor data. These built-in analyst ratings are combined with subjective user ratings to create SelectHub ratings r
Tags : 
    
Select Hub
Published By: IBM     Published Date: Jul 09, 2014
Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to see why enterprises are turning to managed services to help overcome these challenges so that they can optimize the value of their IT investments and achieve their corporate objectives.
Tags : 
ibm, managed services, it investments, data center, it infrastructure, managed services provider
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, networking, security, it management, wireless
    
IBM
Published By: Cisco     Published Date: Jan 05, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb, networking, security, it management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
security, operations, affordability, av labs, open threat, exchange, analyst, report, research, competitive, landscape, it management
    
AlienVault
Published By: Gleanster Research     Published Date: Oct 11, 2012
Authored by two luminary Business Intelligence (BI) industry analysts. This 9 page report exposes best practices on Self-Service BI. The findings come from a Q3'12 survey on BI, which captured the experiences of 327 organizations.
Tags : 
business intelligence, cio, self-service, business analytics, data warehouse, data, analysis
    
Gleanster Research
Published By: IBM     Published Date: Oct 24, 2013
This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances.
Tags : 
enterprise asset management, maturity levels, processes, it asset management, asset management, service, inventory, procurement, work, asset, telecom
    
IBM
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Xiotech     Published Date: Apr 13, 2007
Organizations face a double whammy when it comes to data archive management. On one hand, the volume of digital and paper archives is growing exponentially. Industry analysts report that digital hard disk storage has grown 85 percent a year over the last eight years and 2.7 billion new sheets of paper are filed into folders every day.
Tags : 
data archive, data management, storage, data warehousing, archive management, document search, search and retrieval, document management, document archive, xiotech
    
Xiotech
Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade, upgrade vpn, analyst report, aventail, networking, network security
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
    
Aventail
Published By: NetSuite     Published Date: Aug 21, 2009
This Yankee Group White Paper, compliments of NetSuite, shows how on-demand applications can significantly reduce cost vs. on-premise applications. See how to reduce the total cost of ownership (TCO) of deploying & integrating CRM & accounting/ERP applications.
Tags : 
crm, accounting, cost control, tco, total cost of ownership, customer relationship management, erp, enterprise resource planning, enterprise software, analyst report, netsuite, it management, enterprise applications, small business networks
    
NetSuite
Published By: Opalis     Published Date: Nov 06, 2006
Automating repetitive Data Center Operations into best practices makes response times faster, more reliable, and less costly. Learn how to extend your current IT systems to do more of the routine work, freeing up IT staff for higher-value projects.
Tags : 
process automation, automation, business process automation, bpa, data centers, datacenter, datacenters, response time, cost control, spending, it automation, analyst report, opalis, it management, governance, migration, network management
    
Opalis
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
    
Trapeze Networks
Published By: EMC Corporation     Published Date: May 27, 2011
This ESG paper describes how through consistent individual product innovation and integration EMC backup and recovery solutions tackle the issues that prevent customers from transforming data protection.
Tags : 
esg analyst report, emc, data protection, backup, brian babineau, david a. chapa, data growth, infrastructure, deduplication, bandwidth management
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2011
In this paper, IDC examines solutions from EMC and explains how they can help to speed the benefits of virtualization while modernizing the backup and recovery process. Read this white paper to learn more today!
Tags : 
emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar, power and cooling
    
EMC Corporation
Published By: EMC Corporation     Published Date: Jun 12, 2012
Until recently, NorthStar Trade Finance Inc. had primarily been holding their data on legacy storage systems. Find out how they solved their infrastructure performance and growing storage issues using EMC VNXe in this complimentary case study!
Tags : 
emc vnx, northstar, finance, productivity, unified storage, storage, emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar
    
EMC Corporation
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.