RSS feed Get our RSS feed

News by Topic

comparative

Results 26 - 50 of 64Sort Results By: Published Date | Title | Company Name
By: Coupa     Published Date: Mar 07, 2016
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: Provides a comparative analysis of 10 leading solutions Provides a roadmap to the process of selecting a provider
Tags : 
     Coupa
By: Coupa     Published Date: Apr 13, 2016
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: Provides a comparative analysis of 10 leading solutions Provides a roadmap to the process of selecting a provider
Tags : 
     Coupa
By: Google Cloud     Published Date: Aug 17, 2017
Cloud Spectator, an independent benchmarking and consulting agency, has released a new comparative benchmarking study that ranks Google Cloud #1 for price-performance and block storage performance against AWS, Microsoft Azure and IBM SoftLayer.
Tags : 
     Google Cloud
By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
     Incapsula
By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
     Trend Micro
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
     Citrix Systems
By: CommVault     Published Date: Jun 10, 2015
Automate the burden of discovery, classification, filtering and policy assignment for virtual machine protection with Simpana® software.
Tags : protection, data, infrastructure, cloud, operation, retention
     CommVault
By: McAfee EMEA     Published Date: Nov 15, 2017
NSS Labs performed an independent test of the McAfee Endpoint Security v10.5 product. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v1.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com.
Tags : mcafee, endpoint, security, product, technology
     McAfee EMEA
By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : backup, data deduplication, deduplication, sepaton, tco
     SEPATON
By: SAS     Published Date: Apr 25, 2017
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
     SAS
By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : epp, endpoint, protection, threats, malware, nss
     McAfee
By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : av-test, deep defender, rootkits, detection
     McAfee
By: RingCentral     Published Date: May 22, 2014
The Cloud; software as service across the Internet, is experiencing mass proliferation for everything from banking to CRM. Communications are part of this migration and offer a compelling solution over the retro, hardware-based systems known as PBX. This paper illustrates comparative anatomies of the old and new models. Major benefits of cloud communications are detailed, including the elimination of costs, removal of complexity for managing the system, alleviating IT resources, and the benefits of one system with a host of features. A deep-dive of the technology supporting the solution is included.
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
     Trend Micro SaaS
By: McAfee     Published Date: Nov 12, 2014
AV-TEST did a review of McAfee Web Protection in the Cloud vs. Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine performance against the latest web threats.
Tags : av-test, mcafee web gateway, web protection, cloud gateway, websense cloud security
     McAfee
By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 26 pages and is based on the experiences of 319 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 47 technology solution providers.
Tags : gleanster, marketing, email marketing, personalization, b2b, customers, email campaigns, web analytics
     Gleanster
By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : ibm, nss labs, product testing, network security, computer security, application security
     IBM
By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : ibm, ibm security network, ips gx7800, security
     IBM
By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : mcafee, epp, endpoint, protection, threats, malware, nss
     McAfee
By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : mcafee, av-test, deep defender, rootkits, detection
     McAfee
By: Upsite Technologies     Published Date: Mar 02, 2015
This white paper presents and compares the effectiveness of two types of airflow containment systems (legacy and modular), the resultant impact on IT temperatures, the energy consumption and associated operational costs for the data center, and the projected return on investment (ROI) for implementing the containment systems.
Tags : airflow management, data center management, power and cooling, containment, data center energy
     Upsite Technologies
By: Cisco     Published Date: Feb 16, 2016
While the companion comparative reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this individual test report provides detailed information not available elsewhere.
Tags : cisco, breach detection, system test, data security, threat, security
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco's Business Cloud Advisor provides a source of comparative cloud adoption levels supported by an IDC research model that integrates benchmarks calculated from the responses of over 3,400 organizations that took part in the IDC CloudView survey and analysis supported by IDC's business outcomes research. This analysis of your responses places You with 31% of the overall organizations in the benchmarked group at cloud adoption level 2 – Opportunistic.
Tags : cloud, organization strategies, information technology
     Cisco
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics