Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

report

Results 101 - 125 of 4545Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
    
Citrix Systems, Inc.
Published By: Okta     Published Date: Oct 30, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, enterprise applications
    
Okta
Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, networking, security, it management
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, it management
    
Okta
Published By: Cisco     Published Date: Aug 27, 2015
Gartner's evaluation of 16 contact center infrastructure (CCI) vendors in its 2015 CCI Magic Quadrant report.
Tags : 
contact center infrastructure, unified communication, infrastructure management, crm, customer relationship management, cci solutions, enterprise software management, convergence
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : 
citrix, gartner, magic quadrant, enterprise, mobility
    
Citrix Systems, Inc.
Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection, monitoring
    
AlienVault
Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application
    
Cisco
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
magic quadrant, enterprise mobility management, emm, mobility security, vendors, networking, security, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
ibm, fiberlink, maas360, gartner, enterprise, mobile management, networking, wireless
    
IBM MaaS360
Published By: Bounty Jobs     Published Date: Oct 14, 2015
The BountyJobs Direct Hire Agency Benchmarking Reports are released twice a year to provide business leaders with key insights into trends and past performance of the agency recruiting marketplace, where companies seek some of the most highly sought-after candidates.
Tags : 
    
Bounty Jobs
Published By: Coupa     Published Date: Apr 13, 2016
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: Provides a comparative analysis of 10 leading solutions Provides a roadmap to the process of selecting a provider
Tags : 
    
Coupa
Published By: Coupa     Published Date: Mar 07, 2016
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: Provides a comparative analysis of 10 leading solutions Provides a roadmap to the process of selecting a provider
Tags : 
    
Coupa
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters
Published By: PulseSecure     Published Date: Apr 06, 2015
Learn about the 2015 mobile threat landscape and see how you can prepare your organization for 2015 and beyond with this market report.
Tags : 
mobile threats, pulsesecure, mobile security, mobile threat landscape, market report, security, it management, enterprise applications
    
PulseSecure
Published By: LogMeIn     Published Date: Oct 08, 2015
Read this report to find out how remote support tools are used across service disciplines in a variety of use cases.
Tags : 
remote support trends, remote support, web collaboration, support solutions, remote support tools
    
LogMeIn
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research, software development, knowledge management
    
HPE Service Virtualization
Published By: HP     Published Date: Dec 03, 2015
The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
service virtualization, data, market snapshot, voke research, software development
    
HP
Published By: Simplivity     Published Date: Jul 02, 2015
ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.
Tags : 
hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection
    
Simplivity
Published By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for today’s sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 12–18 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Jan 12, 2016
This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
Published By: Qvidian     Published Date: Mar 04, 2015
This Sales Execution Trends Report investigates new obstacles sales organizations face to meet these objectives, as well as explores current conditions and investment areas needed to improve sales execution; providing further market insight into the state of sales today.
Tags : 
sales execution, sales trends, marketing insight, quota attainment
    
Qvidian
Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity
    
Lumension
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.