analyst report

Results 1 - 25 of 160Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : content management, customer experience management, web content management
     Adobe
By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : internet, web, attacks, technology, ddos
     Akamai Technologies
By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb, networking, security, it management
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report, research, competitive, landscape, it management
     AlienVault
By: AlienVault     Published Date: Oct 05, 2016
Read this analyst report from Frost & Sullivan to learn more about the changing SIEM market and AlienVault's SMB-focused approach to SIEM.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
     AlienVault
By: Alteryx, Inc.     Published Date: Apr 21, 2017
Data Analytics has become critical for many business decision makers. However, many of these managers and data analysts still rely on spreadsheets and other legacy-era tools that fall far short of current needs. As a result, they also rely heavily on a virtual army of data specialists and scientists, working under the auspices of a centralized analytics group, to prepare, blend, analyze, and even report on the critical data they need for decision making. Download this new paper to get the details behind self-service data analytics, and how it lets business analysts: Take charge of the entire analytical process, instead of relying on other departments Overcome limitations of legacy tools to save time and prevent errors Make more comprehensive and insightful business decisions at speed
Tags : 
     Alteryx, Inc.
By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing, it management
     Altiscale
By: Amazon Web Services     Published Date: Apr 16, 2018
SAP and Amazon Web Services (AWS) have jointly developed a cloud-migration test program, Fast Amazon SAP Transformation (FAST), that helps you address time- and cost-related uncertainties when migrating HANA to the AWS cloud. This analyst report from Ovum explores how FAST (a four-step testing process) drastically reduces uncertainties about the time and costs involved in your HANA cloud migration. Download the report now and you’ll discover how FAST can help you: -Quickly quantify costs, risks, and time for migrating SAP ERP applications to the AWS Cloud. -Run your mission-critical applications faster and more reliably Migrate your SAP HANA database to the cloud in only a few days with minimal infrastructure cost Read the Report
Tags : 
     Amazon Web Services
By: ATG     Published Date: Feb 04, 2010
Written by: Forrester Research and Sponsored by: Art Technology Group, Inc. In this economic climate, no one can afford to lose a customer. Rather than halting spending, smart customer service executives will use this economic downturn as an opportunity to regroup and reprioritize. What should they focus on?
Tags : atg, live help, click to call, smartphone, click to chat, customer service, callbacks
     ATG
By: ATG, Inc.     Published Date: Oct 07, 2010
Read the complimentary analyst report to gain valuable insight and actionable strategies for extending your customer service to the online channel.
Tags : atg, online customer service, mobile channel, mobile commerce, ebusiness, customer satisfaction, call center
     ATG, Inc.
By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
     Automation Anywhere
By: Avaya     Published Date: Mar 04, 2016
Seize emerging communications opportunities Analyst Dave Michels writes that midsized businesses have opportunities as unique as their challenges, specifically in the communications space where full-stack solutions have created optimization potential. Read the report to learn more >
Tags : communication, reporting, network management, best practices
     Avaya
By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade, upgrade vpn, analyst report, aventail, networking
     Aventail
By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
     Aventail
By: BlueData     Published Date: Aug 19, 2015
Many organizations seeking to get started with Hadoop implementation have resorted to the public cloud to avoid the complexities of deployment. Organizations are always looking for an opportunity to take advantage of the simplicity of cloud deployment and the efficiencies of multi-tenant operations on premise. Download this white paper to see why there is a greater need to simplify on-premise deployment and see how this will greatly improve manageability and security.
Tags : big data, hadoop, hadoop-as-a-service, multi-tenant, and infrastructure, data center
     BlueData
By: BlueData     Published Date: Aug 19, 2015
As companies seek to better understand their customers, their opportunities, and themselves, they are embracing new technologies such as Hadoop and NoSQL to better manage and manipulate their data. Yet a complete solution for big data has many moving parts while at the same time these moving parts are continuously evolving. Download this white paper to figure out how to make all the moving parts work smoothly together and see how this will ease frustration with business users and free up your IT teams time to handle other issues.
Tags : big data infrastructure, hadoop deployment, spark, analytics software, big data, data management, data center
     BlueData
By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
     BMC ASEAN
By: Box     Published Date: Nov 24, 2015
Based on feedback we’ve heard from customers and prospects, along with analyst and industry reports, we’ve pulled together the following considerations when evaluating Dropbox for Business.
Tags : box, cloud, productivity, business, enterprise, collaboration, knowledge management, enterprise applications, data management, business technology
     Box
By: CA Technologies     Published Date: Jul 06, 2011
The concept of cloud computing implies that the cloud computing platform is "mist" - ethereal and simple. In reality, it requires a complex infrastructure and sophisticated processes to make the illusion a reality
Tags : cloud-computing. ca, cloud, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report, private cloud, service catalogue.
     CA Technologies
By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report.
     CA Technologies
By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
     Carbonite
By: Carbonite     Published Date: Oct 10, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.1 By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
     Carbonite
By: CDW-Lenovo     Published Date: Oct 15, 2015
This Report examines and compares the reliability of 14 major server platforms, 18 server operating system distributions and 11 server hardware virtualization layers. It also explores the underlying issues that positively or negatively influence the inherent reliability of servers and operating systems. And it delves into the external elements that directly impact planned and unplanned system downtime.
Tags : 
     CDW-Lenovo
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com