RSS feed Get our RSS feed

News by Topic

gartner

Results 301 - 325 of 665Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Feb 13, 2018
Today’s customers want something different. They want a real experience. The kind that is memorable because a business actually knows them. Connecting in this powerful way takes the right marketing technology, understanding, and follow through. See why we have the highest position for our Completeness of Vision and Ability to Execute in Gartner’s 2017 Marketing Quadrant for Digital Marketing Hubs.
Tags : 
     Adobe
By: Adobe     Published Date: Feb 13, 2018
Today’s customers want something different. They want a real experience. The kind that is memorable because a business actually knows them. Connecting in this powerful way takes the right marketing technology, understanding, and follow through. See why we have the highest position for our Completeness of Vision and Ability to Execute in Gartner’s 2017 Marketing Quadrant for Digital Marketing Hubs.
Tags : 
     Adobe
By: Adobe     Published Date: Feb 13, 2018
Because you don’t just deliver content. You deliver a customer experience. We're honored that once again, we've been positioned as a leader in Gartner’s Magic Quadrant for Web Content Management (WCM). We believe this validates Adobe Experience Manager as a forward-thinking vision of what content management can be throughout an entire customer journey. And with the integration of Adobe Experience Cloud and Adobe Creative Cloud, we offer more than a content management platform. It’s a content management powerhouse. Read the report and learn about Adobe Experience Manager’s strengths according to Gartner — and how you can bring those strengths to your own customer experiences.
Tags : 
     Adobe
By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
     Tenable
By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
     Tenable
By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
     Tenable
By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
     Trend Micro
By: Riverbed     Published Date: Nov 02, 2016
"Infrastructure and operations leaders often struggle to understand the role of cloud computing and to develop strategies that exploit its potential. I&O leaders should complete the prerequisites before making the technology decisions required for successful, service-centered cloud computing strategies. Read the Gartner report to learn more about key recommendations: Identify the cloud-computing-related IT services you will offer or procure. Document the internal processes that will be affected by the identified cloud services. Map applications and workloads to the associated cloud services."
Tags : 
     Riverbed
By: Marketo     Published Date: Sep 22, 2015
[UPDATED FOR 2015] Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.
Tags : martketo, crm, gartner, lead management, strategy, leaders vendor. b2b, marketing, technology
     Marketo
By: BMC Control M     Published Date: Jul 22, 2009
Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
Tags : quadrant, magic quadrant, job scheduling, bmc control-m, workload, automation broker, gartner, data
     BMC Control M
By: Dell-Intel     Published Date: Jun 19, 2009
Despite progress in virtualization, much development still remains. With predictions that virtualization will become pervasive, this research highlights forthcoming challenges and strategic issues facing IT planners. Register now for this free Gartner report sponsored by Dell and Intel to receive important advice on how to deal issues such as heterogeneity, resources and performance optimization, and the increasing fragmented tool market.
Tags : dell, intel, virtualization, gartner, it planner, server virtualization, servers, ovf
     Dell-Intel
By: Citrix Systems     Published Date: Nov 10, 2014
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. — Read the report today!  Compliments of Citrix.
Tags : application, deployment, research, enterprise, data center, controller, network, security
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
Learn why Citrix was named a leader in the 2015 Gartner Magic Quadrant for Application Delivery Controllers, for the ninth consecutive year. With more than 25 years experience providing secure access to enterprise applications, it’s clear you can rely on Citrix to drive new levels of security and productivity in your organization. Register to download the 2015 Gartner Magic Quadrant for Application Delivery Controllers, plus receive a bonus white paper, Citrix NetScaler - A Foundation for Next-Generation Datacenter and Cloud-Based Security.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
With faster adoption rates than any other upgrade, Windows® 10 is breaking records—and it’s poised to accelerate. In fact, Gartner predicts that 50% of businesses will be on their way to Windows 10 by early 2017—and 100% by 2019. Businesses of all sizes need an IT strategy that maintains employee productivity and business continuity without the worry of app compatibility issues or OS instability across differing end points. The time to upgrade to Windows 10 is now.
Tags : citrix, windows, windows 10, upgrade, productivity
     Citrix Systems
By: Trend Micro Inc.     Published Date: Aug 23, 2011
In this program, leading experts from Gartner, Inc. and Trend Micro, write down the risks and opportunities of virtualization security.
Tags : 
     Trend Micro Inc.
By: IBM - Tririga     Published Date: Dec 21, 2011
A recent study by Gartner, in collaboration with TRIRIGA, an IBM Company, surveyed 130 professionals responsible for the planning and implementation of sustainability initiatives across large corporations. This paper provides a thorough analysis of these survey results.
Tags : ibm, technology, tririga, sustainability, asset management
     IBM - Tririga
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
     ForeScout
By: McAfee     Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
Tags : dlp, data loss prevention, content-aware dlp, context-aware dlp
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
     McAfee
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : wireless lan, infrastructure, hardware solution, network services, security, technology, best practices
     Aruba Networks
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
     Aruba Networks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics