analyst report

Results 151 - 165 of 165Sort Results By: Published Date | Title | Company Name
By: SWsoft     Published Date: Aug 21, 2009
This top ten list provides key guidelines for honing in on the differences between the solutions and helping to understand the basic options and limitations of each server virtualization technologies approach.
Tags : server virtualization, servers, server hardware, analyst report, swsoft, it management
     SWsoft
By: Symantec     Published Date: Dec 19, 2012
We recommend this analyst report for anyone considering an investment in an archive solution.
Tags : information archiving, enterprise, magic quadrant, e-discovery, compliance, storage
     Symantec
By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the yearís global internet threat activity. The report is based on data from the Symantecô Global Intelligence Network, which Symantecís analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings ē 91% increase in targeted attacks campaigns in 2013 ē 62% increase in the number of breaches in 2013
Tags : internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
     Symantec
By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : vulnerability management, analyst report, idc
     Tenable
By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDCís Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : secure devops, idc, analyst report, container security
     Tenable
By: Teradata     Published Date: May 02, 2017
Ventanaís Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : ventana, report, iot, operational intelligence, organizations
     Teradata
By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
     Trapeze Networks
By: Trifacta     Published Date: Oct 25, 2018
The rise of the self-service analytics era has called for a more flexible, iterative approach to data preparation. But as you and your team look to invest in modern data preparation solutions, understanding how to best evaluate these technologies can be difficult. In Ovumís first Decision Matrix report on self-service data preparation, analyst Paige Bartley takes a comprehensive look at the eight major data preparation vendors by assessing each companyís technology and execution. Download this report to learn: Which vendors Ovum ranks as leaders in self-service data prep The strengths, weaknesses, opportunities and threats of all 8 data prep vendors A detailed overview of the criteria Ovum utilized in their evaluation
Tags : 
     Trifacta
By: Verio     Published Date: Aug 06, 2014
Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. ē Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. ē Using NTTís vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. ē Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. ē The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. ē ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).
Tags : ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws, free bandwidth, ease-of-use, templates, cloud services, portal, load balancing, auto scaling, monitoring, 24/7 support, affordable, 99.99% reliability, data center
     Verio
By: VMware AirWatch     Published Date: Sep 16, 2015
This report details the results of a survey taken from pre-qualified IT decision makers from North America and Europe, and shows how AirWatch by VMware received the highest scores for EMM vendor promise and fulfilment. 950 surveys were completed.
Tags : airwatch, vmware, emm, vendor promise, fulfillment, security, it management, business technology
     VMware AirWatch
By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : airwatch, security, data defense, mobile, emm, it management, business technology
     VMware AirWatch
By: Workday     Published Date: May 09, 2018
Compare your professional services firm with more than 450 PSOs with this expansive benchmark study from Service Performance Insight. Get access to hundreds of pages of charts, graphs, and analyses that offer insight into the performance of your peers and where you can improve to make the greatest impact.
Tags : 
     Workday
By: Xiotech     Published Date: Apr 13, 2007
Organizations face a double whammy when it comes to data archive management. On one hand, the volume of digital and paper archives is growing exponentially. Industry analysts report that digital hard disk storage has grown 85 percent a year over the last eight years and 2.7 billion new sheets of paper are filed into folders every day.
Tags : data archive, data management, storage, data warehousing, archive management, document search, search and retrieval, document management, document archive, xiotech
     Xiotech
Start   Previous    1 2 3 4 5 6 7     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com