Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 651 - 675 of 2802Sort Results By: Published Date | Title | Company Name
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup, it management, enterprise applications
    
Unitrends
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: NetApp     Published Date: Sep 24, 2013
This informative guide represents months of rigorous research that your organization can leverage to kick start its evaluation process. Read on to learn which private cloud array will qualify as best-in-class for your company.
Tags : 
big data, storage cloud, best practices, technology, buying guide, netapp
    
NetApp
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Workday Netherlands     Published Date: Feb 04, 2019
U wilt het evaluatieproces voor een nieuwe technologieprovider starten? Deze complete gids helpt u met de voorbereiding op dit evaluatieproces. U ontdekt waar u op moet letten, zodat u geïnformeerd aan uw zoektocht begint. Lees de gids.
Tags : 
financiën, workforce-technologie, digitale strategie
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Apr 30, 2019
U wilt het evaluatieproces voor een nieuwe technologieprovider starten? Deze complete gids helpt u met de voorbereiding op dit evaluatieproces. U ontdekt waar u op moet letten, zodat u geïnformeerd aan uw zoektocht begint. Lees de gids.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Bronto     Published Date: Sep 09, 2013
Are you constantly jumping from project to project with barely enough time to breathe? When continually pressed for time, how do you efficiently and effectively measure your email marketing programs? This concise and practical guide can help.
Tags : 
email marketing performance, strategic email marketing
    
Bronto
Published By: HP     Published Date: May 14, 2014
To respond to rapid business environmental changes, enterprises are now adopting a more agile and services-oriented model for centralized IT, often characterized as “private cloud.” Public cloud service providers have become adept at adding new customers, new applications, and more compute-intensive workloads with minimal delay. While traditional enterprise IT may not be able to fully emulate this model, they can use virtualization – both at the levels of servers and storage – to come as close to the cloud as possible. Read this Evaluator Group paper to learn how HP 3PAR StoreServ Storage platforms can be foundational to developing IT agility.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: HP     Published Date: Jul 22, 2014
In this Evaluator Group Technology Insight we focus on the attributes of modern Tier One enterprise storage that could be considered when writing an RFP for new arrays. We briefly outline the differences between modern Tier One and traditional Tier One storage and review HP 3PAR StoreServ in light of these differences. We will define Tier One storage in more detail as well as other storage platform tiers in later Technology Insights.
Tags : 
tier one, arrays, technology, enterprise, storage, platform
    
HP
Published By: LeanData     Published Date: Nov 07, 2019
There has been an exciting revolution that is changing the landscape for businesses far and wide. The advancement of marketing and sales technology has enabled businesses to work at the speed of life. But with the rapidly moving technology space, organizations are finding that they’ve built such robust tech stacks that it’s time to re-evaluate just how well their technology is working for them—as opposed to against. With many internal organizations across marketing, sales, and customer success reporting their team’s tech stack consists of 30 or more tools, we are realizing there is a wealth of untapped Executive Summary data at our fingertips. Many have overlooked the role people, process, and data play in maximizing the returns technology can yield. Revenue Operations is a way to bridge gaps between siloed organizations. It is about marketing, sales, customer success, and partner ops teams working better together. This guide is dedicated to exploring the emergence of Revenue Ops, its
Tags : 
    
LeanData
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : 
watchguard, security, database security, security, it security, it infrastructure, intrusion prevention, it management
    
WatchGuard
Published By: NAVEX Global     Published Date: Mar 21, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: Marketo     Published Date: Jul 13, 2015
Content marketing is the process of creating valuable, relevant content to attract, acquire, and engage your audience.
Tags : 
content marketing, content alerts, content strategies, brand voice, content mix
    
Marketo
Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
    
NAVEX Global
Published By: Evariant     Published Date: Apr 09, 2018
If you're going to commit to providing the highest quality care to patients, improving the customer experience and providing proactive service that builds lifetime relationships with patients is a requirement. By creating a comprehensive 360 view of the caller, agents are armed with the right context and talking points to provide a highly personalized, more informed experiences on-the-fly. Watch this presentation to capitalize on every customer interaction to build deeper, more personalized relationships with their prospects and existing patients, effectively transforming the call center into a profit center. Watch the presentation now.
Tags : 
patient experience, call center, improved care continuum, access center, customer experience, patient journey
    
Evariant
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
Modern Marketers know their customers expect experiences that will blow their minds. Customers are tech savvy, on the move, and want to interact with your brand on their terms. This means wherever, whenever, and however they want. It’s the job of today’s marketers to deliver cross-channel experiences that are personalized, relevant, and timely. When you engage your customers on their terms you create the long-lasting relationships that your business and brand need to drive loyalty and advocacy. Here’s the good news. It’s now possible thanks to the boom of marketing technology solutions. In the last five years the amount of marketing technology options has skyrocketed from just 150 solutions to more than 4,000. This can only mean one thing: marketing technology is here, rapidly being adopted, and proving its value every day.
Tags : 
    
Oracle Marketing Cloud
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.