epo

Results 276 - 300 of 4831Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
In the Overall segment, the ISG Provider Lens Next-Gen ADM Quadrant Report cited LTI’s idea-led innovation approach to delivering unique business solutions; the organization’s digital way of working (WoW), designed to deliver and amplify outcomes; and an IP-led growth strategy as key strengths that earned the market leader designation. The ISG Provider LensTM report recognized LTI’s extensive experience in working with both packaged and custom software, running multi-year maintenance deals, and a growing digital portfolio, as factors that make it an attractive alternative to large multinational providers.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
After evaluating all the options on the market, one company chose Automation Anywhere RPA to start its digital transformation journey and automate its invoice processing, help desk, and internal financial reporting processes. The company achieved its initial goals—and more. It got the first initiative—automating accounts payable—up and running in less than 6 months, and increased the efficiency of the operation by 300%.
Tags : 
    
Automation Anywhere APAC
Published By: Flexera     Published Date: Apr 17, 2019
Visibility is the key to managing IT assets. New EOL/EOS eBook explains how.
Tags : 
    
Flexera
Published By: LogMeIn     Published Date: Apr 16, 2019
Organisations need a password security benchmark
Tags : 
    
LogMeIn
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Forward-thinking enterprises understand what it takes to be successful in this data-rich, increasingly automated economy. According to the Harvard Business Review Analytic Services research report The Rise of Intelligent Automation: TurningComplexity into Profit, sponsored by Oracle, at least 7 in 10 executives understand that predictive analytics (80%) and AI and machine learning (68%) are important for the future of the business. Even as executives recognize the vital role data plays in their businesses, many are unable to take advantage of the value residing in their data. The old ways of collecting, managing, storing, and analyzing data are no longer effective, and are preventing businesses from extracting potential value. Many simply can’t execute on a data-driven vision.
Tags : 
    
Oracle EMEA
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research report—presented by Epicor Software—you’ll discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
    
Cherwell Software
Published By: Unit4     Published Date: Apr 12, 2019
Financial planning and analysis is evolving to support digital business initiatives. Application leaders supporting finance transformation must focus on new ways of managing financial performance by enabling broader integration with operational plans and actionable performance reporting. Download this complimentary Gartner report and discover how.
Tags : 
    
Unit4
Published By: Uberall     Published Date: Apr 12, 2019
We started by analyzing the most common types of voice search queries/problems online and narrowed it down to five:
Tags : 
voice, uberall, voice search, mobile search, google maps, industry insights
    
Uberall
Published By: MicroStrategy     Published Date: Apr 11, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Apr 11, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: Epicor     Published Date: Apr 11, 2019
As a manufacturer, your ability to grow in this digital marketplace depends on how you leverage the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? This Forrester Research report—presented by Epicor Software—details the latest insight on software as a service (SaaS) business solutions. SaaS applications will evolve in the cloud to new levels of value in: • Intelligence • Flexibility • Connectivity • User experience Read the report for predictions and recommendations to help guide your strategic growth initiatives.
Tags : 
    
Epicor
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Gigamon     Published Date: Apr 11, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in today’s digital age.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Published By: Mimecast     Published Date: Apr 10, 2019
The latest threats, confidence killers and bad behaviors - and a cyber resilience strategy to fix them.
Tags : 
    
Mimecast
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
This Forrester Wave report evaluates the top applications management and digital operations services (AMDOS) providers.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
IBM Institute for Business Value report discussing how multicloud environments are proliferating in surveyed organizations, the benefits of multicloud management and an approach to managing multicloud environments
Tags : 
    
Group M_IBM Q2'19
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee