research report

Results 1 - 25 of 438Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Epicor     Published Date: Dec 06, 2018
In our current technological age, it’s important for manufacturers to embrace digital transformation or risk getting left behind by the competition. LNS Research has been studying the industrial software market for years, and in talking with hundreds of successful manufacturers, they found one common theme—the importance of finding a starting point for digital transformation. Leveraging MES software can be a low risk, high-value entry point for manufacturers as they journey toward digital excellence. Epicor MES allows manufacturers to: • Gain real-time production information • Improve productivity • Lower costs Read the LNS Research study to learn why an MES solution from Epicor is an important component in reaching operational maturity and digital transformation.
Tags : 
manufacturing, epicor mes, digital transformation
    
Epicor
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: goTransverse     Published Date: Nov 25, 2015
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
    
goTransverse
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: Top 5 causes of downtime and poor performance across the infrastructure stack How machine learning and predictive analytics can prevent issues Steps you can take to boost performance and availability"
Tags : 
cloud, nimble storage, infrastructure
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Cisco     Published Date: Jul 30, 2015
An Application-Centric Infrastructure Will Enable Business Agility
Tags : 
    
Cisco
Published By: HP Enterprise Business     Published Date: Mar 02, 2017
Powered by data from 451 Research, the Right Mix web application benchmarks your current private vs public cloud mix, business drivers, and workload deployment venues against industry peers to create a comparative analysis. See how your mix stacks up, then download the 451 Research report for robust insights into the state of the hybrid IT market.
Tags : 
    
HP Enterprise Business
Published By: SAS     Published Date: Jan 17, 2018
This RSR custom research report explores the impact of omnichannel methods on merchandising, marketing and the supply chain; specifically, what analytical capabilities address the challenges that omnichannel selling and fulfillment pose for retailers. Consumers today routinely begin their shopping journeys online, but complete their purchases in nearby stores, in their “home” stores or delivered directly to their doors. Retail analytics enables organizations to capture data from their customers' journeys. Retailers that successfully deliver relevant omnichannel experiences while gaining a more sophisticated understanding of demand (where and how it is initiated) will enhance their brands’ value and create compelling and profitable customer relationships.
Tags : 
    
SAS
Published By: Epicor     Published Date: Sep 20, 2017
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it often simply delays the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons distributors choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Download this report to learn how a new or improved ERP system can help get you the information you need to make informed decisions and act more efficiently, improving overall company performance.
Tags : 
erp software, enterprise resource planning software
    
Epicor
Published By: Epicor     Published Date: Sep 20, 2017
More than ever, businesses are considering a cloud solution for their enterprise resource planning (ERP) deployment over an on-premises system. Cloud technology appeals to these companies because updates and fixes occur automatically with little or no effort from internal IT staff, and because cloud-based solutions provide access to real-time data from anywhere. Employees want tools that make it easier for them to complete everyday tasks and make informed decisions that help the business grow. Aberdeen’s research report, “Top Performers Know It’s Time to Migrate to Cloud ERP: Here’s Why and How,” uncovers the reasons successful companies are choosing cloud over on-premises ERP models. Download this SmartBite for a quick look at the report’s highlights.
Tags : 
    
Epicor
Published By: Dell     Published Date: May 13, 2016
No matter your line of business, technology implemented four years ago is likely near its end of life and may be underperforming as more users and more strenuous workloads stretch your resources thin. Adding memory and upgrading processors won't provide the same benefits to your infrastructure as a consolidation and upgrade can. Read this research report to learn how upgrading to Dell's PowerEdge VRTX with Hyper-V virtualization, Microsoft Windows Server 2012 R2, and Microsoft SQL Server 2014 could reduce costs while delivering better performance than trying to maintain aging hardware and software.
Tags : 
    
Dell
Published By: Oracle     Published Date: Mar 05, 2015
Business buyers are more demanding than ever. They expect organizations to meet their precise needs through the life-cycle of interactions with B2B brands. This means providing today’s business buyers with consumer like-experiences that allow them to do their job better and easier, and making the complex simple. Download this white paper from Aberdeen Group to learn the five best practices to get B2B e-commerce right and how to achieve best-in-class performance in customer retention, revenue growth, and operational efficiency.
Tags : 
oracle, b2b, commerce, empowerment, customer, e-commerce, content
    
Oracle
Published By: LogMeIn     Published Date: Mar 19, 2015
In the past two years, businesses’ desire to understand and connect with the mobile user has grown and expanded throughout nearly every vertical market. We created this project as a way to understand the mindset, demographics, and behaviors that drive mobile engagement so that we can advise businesses on how to do it right – and how to avoid doing it wrong. This research report is based on a global study of more than 5,800 mobile device owners, and as such, is the most comprehensive primary research report ever done on mobile engagement.
Tags : 
mobile management, mobile users, mobile engagement
    
LogMeIn
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
digital business, technology, best practices, forrester, enterprise
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability
Tags : 
    
Hewlett Packard Enterprise
Published By: Juniper Networks     Published Date: Mar 27, 2018
In our 40-criteria evaluation of data center hardware platforms for software-defined networking (SDN), we identified the nine most significant players — Alcatel-Lucent Enterprise, Arista Networks, Extreme Networks (which recently acquired Brocade Communications System’s data center networking business), Cisco Systems, Cumulus Networks, Dell, Huawei, Juniper Networks, and Pluribus Networks — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations professionals (I&O) make the right choice.
Tags : 
    
Juniper Networks
Published By: Adobe     Published Date: Aug 30, 2017
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, Evergage, Google, IBM, Localytics, Mixpanel, Optimizely, SAS, and Webtrekk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, Evergage, Google, IBM, Localytics, Mixpanel, Optimizely, SAS, and Webtrekk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps customer insights (CI) professionals make the right choice
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones — The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
In our 36-criteria evaluation of omnichannel demand-side platform (DSP) providers, we identified the 11 most significant ones — Adform, Adobe, AOL, AppNexus, DataXu, Google, MediaMath, Rocket Fuel, The Trade Desk, Turn, and Viant — and researched, analyzed, and scored them. This report shows how each provider measures up and helps marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: IBM Watson Health     Published Date: Mar 30, 2018
Chilmark Research, a global research and advisory firm, recently released a report rating vendors and solutions in the healthcare analytics industry. IBM Watson Health, a leader in healthcare analytics, has put together this infographic comparing how its solutions stack up against some of the closest competitors in the industry in areas such as population discovery and definition, predictive analytics, cost and utilization, and claims data contribution.
Tags : 
analytics, infographic, predictive analytics, cost utilization, population discovery, claims data, healthcare, chilmark, strategy, healthcare analytics
    
IBM Watson Health
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee