world wide

Results 351 - 375 of 422Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 04, 2016
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of 12 of the top enterprise wireless LAN (WLAN) vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise WLAN solutions, during both the short term and the long term.
Tags : 
cisco systems, idc marketscape, worldwide enterprise wlan, vendor assessment, idc study, wlan solutions, networking, it management, wireless, data management, business technology
    
Cisco
Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS
Published By: ScriptLogic     Published Date: Aug 23, 2011
Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria
    
ScriptLogic
Published By: SugarCRM     Published Date: May 13, 2014
IBM leveraged Sugar's unique user-focused CRM to transform its global sales organization, successfully deploying a new system for reps that manage millions of opportunities worldwide. Read the Ovum report on how IBM completed this herculean task in record time.
Tags : 
ibm, crm, ovum, sugar, global sales organization, sugarcrm, success, it management, enterprise applications
    
SugarCRM
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
    
Q1 Labs
Published By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : 
citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access, business technology
    
Citrix
Published By: Citrix     Published Date: Sep 17, 2013
Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: Oracle     Published Date: Nov 05, 2013
This survey based whitepaper, based on interviews with 229 executives worldwide assesses the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and incentive compensation plans. This is critical in response to emerging market opportunities and complex global economic challenges.
Tags : 
creating sales territory, sales performance, sales plan development, sales data, sales territory, incentive compensation plan, enterprise communications, data versus instinct
    
Oracle
Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
Cisco
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security
    
Palo Alto Networks
Published By: HP     Published Date: Aug 26, 2014
HP Simply StoreIT takes the stress out of storage. HP and our network of over 200,000 channel partners worldwide can help you choose the right solutions to fit your biggest business challenges. We can help you overcome obstacles including too little time for managing IT, budgets for upgrading infrastructure, and too many business risks and threats. Now you can take charge of virtualization, storage for business solutions such as Exchange and SQL Server, growing file shares, and data protection for business continuity. Improve your operational efficiency, reduce your risks, and lower storage costs. See how.
Tags : 
storage, budgets, server, virtualization, file, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork
    
HP
Published By: SmartFocus     Published Date: Apr 22, 2015
With 1.75 billion people worldwide owning a smartphone, your customer will now have constant connectivity. Therefore to be successful in your marketing campaigns, it is vital to understand the mobile user experience and ensure all parts of your campaign are mobile optimized. Don’t do this and you could reduce customer engagement and even worse, loose your best customers to your competitors. Our easy to implement mobile marketing tips can help add value to your campaigns and give you the edge.
Tags : 
mobile marketing, personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns
    
SmartFocus
Published By: VMware AirWatch     Published Date: Mar 02, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware AirWatch
Published By: Ring Central     Published Date: Mar 21, 2016
Gartner Inc., the world’s leading information technology research and advisory firm, has positioned RingCentral in the Leaders Quadrant of the 2015 report, Magic Quadrant for Unified Communications as a Service (UCaaS), Worldwide,* as a result of its ability to execute and the completeness of vision.
Tags : 
ring central, gartner, unified communications, cloud, phone systems, wireless, enterprise applications, business technology, telecom
    
Ring Central
Published By: VMware     Published Date: Feb 24, 2017
The enterprise mobility management (EMM) software market continues to grow, and VMware AirWatch® accounts for 16.5 percent of the total EMM software market, the largest market share of any vendor today. IDC calls AirWatch a “top-tier vendor” with a “phenomenal growth rate,” increasing market share from 11.4 percent in 2014 to 16.5 percent in 2015.
Tags : 
    
VMware
Published By: IBM     Published Date: Oct 24, 2013
The Dow Chemical Company is a $60 billion enterprise composed of a worldwide network of 13 business units. Although such a decentralized business structure has competitive advantages, it can also create challenges to setting and achieving enterprise-wide goals.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb, compliance, business technology
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
According to a 2012 Ipsos/Reuters poll, one in five employees worldwide now work from home. In another study, two-thirds of those who responded said they, expect their workplace to go fully virtual within the next few years. This IBM whitepaper analyzes the reasons for this shift in the workplace, and its implications for the facilities management of your company. Learn how to manage the growing number of empty real estate inside your company in a smarter fashion, so that your company runs more efficiently, and cuts down on unnecessary costs.
Tags : 
smarter building, facilities management, changing workforce, mobile workforce, distributed workforce, real estate, energy management, business technology
    
IBM
Published By: OSM Worldwide     Published Date: Sep 13, 2017
Making small changes in shipping can offer a range of beneficial opportunities. Working with a true shipping partner can improve efficiencies and lower your cost — all while increasing your customers’ overall satisfaction. Explore our white paper and learn: • How modifying your shopping cart functionality can enhance your customers’ experience • Why even small adjustments in packaging can have large cost implications • The best ways to improve final-mile delivery
Tags : 
domestic shipping, nationwide shipping, worldwide shipping, international shipping, shipping services, optimize shipping, efficient shipping, reduce shipping costs, improve shipping logistics, improve shipping delivery, improve shipping efficiency, cost-efficient shipping
    
OSM Worldwide
Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
IBM
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Oracle     Published Date: Sep 30, 2014
"Consumers worldwide have nearly 5 billion active mobile subscriptions- that’s almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel. If you’re not aligning your strategies with this new reality, you may find your business headed the way of the landline."
Tags : 
oracle, marketing, cloud, connected, customer, modern, growing, mobile, subscriptions
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee