independent

Results 251 - 275 of 304Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Aug 09, 2013
Symantec Positioned as a Leader in Independent Research Firm Report Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave™: Endpoint Security, Q1 2013 and “remains a good choice” in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors’ previous contact history.
Tags : 
cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing, customer relationship management, crm, business technology, telecom
    
IBM
Published By: MapR Technologies     Published Date: Dec 12, 2013
This independent whitepaper from the Kusnetzky Group Analyst describes the promise and challenges surrounding Big Data. It also validates the M7 solution from MapR, which simplifies big data management by consolidating disparate solutions into a single, enterprise-ready platform.
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata, analytics, mapreduce, data, data center, mapr
    
MapR Technologies
Published By: Symantec     Published Date: Jul 11, 2014
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropriate for your organization. Find out why Symantec was named a “Champion” in virtual backup software.
Tags : 
info-tech, landscape, virtual, software, backup, machine, vendors, networking
    
Symantec
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco
Published By: HP     Published Date: Jun 03, 2014
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, enterprise applications, data management
    
HP
Published By: HP     Published Date: Oct 15, 2014
Just “keeping the lights on” in the server room is highly complex and largely inefficient. Maintaining IT infrastructure, system interdependencies, and application interoperability tie up valuable personnel and resources. The old way of simply throwing more hardware capacity at a problem can only serve to increase the complexity and further dampen productivity. In a perfect world, the infrastructure—hardware and software—would have been built as an integrated but scalable unit from the ground up. In our world, though, the best new systems combine independent pieces of IT infrastructure to form simplified computing platforms, freeing up IT to focus on business innovation rather than infrastructure management. Welcome to the new world of IT.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage, data management
    
HP
Published By: SmartFocus     Published Date: Aug 25, 2015
If your marketing isn’t real-time, it’s out of date. Marketing for the moment is now crucial. Real-time interaction management (RTIM) enables marketing messages to change in real-time when they are opened. The latest innovation in digital marketing. Latest independent report reveals the Strong Performers in the RTIM market.
Tags : 
it management, data management, business technology, data center
    
SmartFocus
Published By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
    
VMware
Published By: Comcast Business     Published Date: May 07, 2018
Companies today are as distributed as their customer base, with branch offices and satellite locations scattered well beyond traditional boundaries. For many, these distributed sites are the face of the company to the customer, with most—if not all— customer interactions occurring in these locations and not in the corporate headquarters. Banks and finance centers, retail stores and even urgent care centers all fit within the category of the branch office, with each location connected to the corporate headquarters and, increasingly each other. Together, they make up the distributed enterprise. However, each location is its own entity and must be able to operate independently of headquarters to ensure business can continue even if one or other locations experience technical issues. Distributed locations, therefore, must be equipped to handle all manner of customer interactions – and evolving customer expectations—and do so in a way that anticipates what the customers want next. From pers
Tags : 
    
Comcast Business
Published By: IBM     Published Date: Jan 10, 2014
Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.
Tags : 
ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance, roi, cost reduction, test automation, rational, risk management, data management
    
IBM
Published By: Norse     Published Date: Mar 10, 2014
Learn how to properly select the right real-time security options for your organization and see how the right actionable security intelligence will allow for safer and more secure data and security operations.
Tags : 
norse, esg, security intelligence, commercial threat intelligence, security data, open source security intelligence, product based security intelligence, real-time security, security, it management
    
Norse
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: IBM     Published Date: Sep 23, 2008
See why IBM BladeCenter S chassis is the right choice for independent businesses that need a powerful, yet simple IT. The white papers inside this informative eKit will show you how this system is easy to deploy, easy to use, and easy to manage; and how its modular technology helps avoid a cable mess in your office space.
Tags : 
ibm, ibm mmdg, bladecenter, small office, soho, ekit, networking
    
IBM
Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
    
Secure Computing
Published By: Quocirca     Published Date: Apr 23, 2007
Many independent software vendors (ISVs) are recognising the benefits of offering software as a service (SaaS) as an alternative for their customers and once the teething problems have been overcome there are a number of long term benefits for both parties.
Tags : 
isv, isvs, saas, software as a service, business model, software service, aspiren, independent software vendor, business management, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security
    
Quocirca
Published By: Infor     Published Date: Feb 27, 2007
With leading brands including Landliebe and Mona, Campina supplies milk, cheese, butter, desserts, yogurt and all kinds of dairy drinks in over 130 countries. Historically, each of these production and sales centers operated on an independent basis. While this allowed for a degree of localized efficiency, it presented a range of issues and potential fault lines which became exacerbated as the company, and the demands of its consumer grew.
Tags : 
productivity, supply chain management, erp, scm, enterprise resource planning, food, dairy, infor, product lifecycle management, quality assurance
    
Infor
Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection, id theft, employee, ex-employee, ex employee, fraud, employee fraud, actimize, security
    
Actimize
Published By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft, software development
    
Thinksoft
Published By: VMware Dell     Published Date: Sep 29, 2008
VMware virtual machines are hardware-independent so any physical server can serve as a recovery target for any virtual machine. Organizations can significantly reduce the cost of hardware for disaster recovery by repurposing underutilized existing servers for recovery targets and disaster recovery testing. VMware Infrastructure also simplifies and accelerates recovery, helping IT organizations meet their time-to-recovery targets.
Tags : 
vmware, dell, disaster recovery, vmotion, iscsi, sans, equallogic, data protection
    
VMware Dell
Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting, websense, test, study
    
Websense
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. has collaborated with IQ Services to deliver technology independent testing solutions that enhance end-to-end voice process lifecycle management within the contact center. The goal is to ensure a positive customer experience by incorporating voice testing and monitoring into every step of your contact center's life cycle - resulting in confidence that your solution works as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Network Automation     Published Date: Dec 02, 2008
Every night for several years, the five Latin America offices of Michigan-based medical technology products manufacturer Stryker Corporation were forced to burn the midnight oil to turn their daily financials into a single consolidated report. Each office has its own independent ERP system, so the process required three hours to compile the data for each territory plus another 90 minutes for a financial analyst at division headquarters to merge the five spreadsheets into one document.
Tags : 
network automation, automate professional, erp, networking, it management
    
Network Automation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee