Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

report

Results 476 - 500 of 4600Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: Oracle     Published Date: Oct 17, 2016
This report shows how organizations are under pressure to identify new business opportunities and innovate faster as cloud computing evolves.
Tags : 
    
Oracle
Published By: IBM APAC     Published Date: May 18, 2017
Today, everything computes. Intelligence has been infused into things no one would recognize as computers: appliances, cars, roadways, clothes, even rivers and cornfields. Tomorrow, many of these things will think, thanks to breakthroughs in cognitive computing. Even the things that don’t think themselves will continue collecting and reporting the massive quantities of data that feed cognitive systems.
Tags : 
ibm, tss, cloud, mobile, appliances
    
IBM APAC
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : 
it security, endpoint security, endpoint protection, security
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: • The fastest growing companies in the world believe that greater technology choice can increase revenue and profits by more than 35 percent • 84 percent of businesses worldwide believe that greater technology choice is crucial to driving efficiency in the future • 72 percent of businesses see security as the biggest barrier to greater technology choice
Tags : 
technology, autonomy, business
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 10, 2012
IDC presents a closer look at the structural changes and functionality--including lightweight frameworks, in-memory data management, and application management--required in order to successfully evolve to a cloud-ready application platform.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 15, 2012
Is your business demanding more innovation? You must respond by rising above mediocrity to deliver great software - to achieve this, you must balance your design to provide 7 key qualities. Boost your commitment to design for all 7 qualities today!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 15, 2012
Cloud computing is gaining widespread adoption, and for good reason. This paper highlights companies' confidence level in deploying custom Java applications in the cloud. Learn how to accelerate application deployment now!
Tags : 
enterprise applications
    
VMWare - vFabric
Published By: FireEye     Published Date: Nov 27, 2012
The FireEye®Advanced Threat Report for the first half of 2012 is based on research and trend analysis conducted by the FireEye Malware Intelligence Lab.
Tags : 
fireeye, threat report, malware, fireeye advanced threat report 1h 2012, email-based attacks., security
    
FireEye
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
    
Red Hat
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology, it management, data center
    
BMC Software
Published By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : 
customizable dashboards, crm, oracle, custom reports, dashboards, sales
    
Oracle
Published By: Oracle     Published Date: Aug 08, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : 
oracle, global customer experience, cx benchmarking, data center
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : 
customizable dashboards, crm, oracle, custom reports, dashboards, sales, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : 
customer experiences, customer service, oracle, rightnow cloud, cloud, crm, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management, enterprise applications, human resource technology
    
Oracle
Published By: Box     Published Date: Aug 13, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, enterprise applications
    
Box
Published By: Box     Published Date: Aug 13, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, cloud computing
    
Box
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.