RSS feed Get our RSS feed

News by Topic

reports

Results 1 - 25 of 305Sort Results By: Published Date | Title | Company Name
By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
     Tenable
By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
     Okta APAC
By: Infosys BPM Ltd     Published Date: Feb 12, 2019
The role of FP&A professionals during the first two weeks of the month entails rushing for month closure, gathering data sets, reports, and scrutinizing, processing and analyzing data in Excel workbooks in discussion with the top management. Increasing revenues, optimizing costs, and aligning with the overall business strategy are a few familiar goals laid down for financial planning and analysis (FP&A) professionals. These goals trickle down from finance leaders who are under constant pressure to provide accurate and timely reporting and analysis to support effective decision making. Read on to know how can digitizing FP&A help the finance team to make more robust decisions and be a key part of the finance transformation.
Tags : 
     Infosys BPM Ltd
By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data
     Mindfire
By: Cisco EMEA     Published Date: Nov 08, 2018
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third party perspective is based on our own hands on testing as well as on interviews with customers who use these products in production environments.
Tags : 
     Cisco EMEA
By: SAS     Published Date: Jan 17, 2018
It’s a social world and the majority of organizations today use Microsoft Office as their chosen office productivity suite. So it’s important to deliver insights where people are working most. This paper shows how you can use results produced by SAS Visual Analytics with Microsoft Office applications – Outlook, Excel, Word, PowerPoint and SharePoint. With plenty of how-to specifics, you’ll see how easy it is to combine analytic visualizations and reports with Microsoft products to share insights, improve collaboration and drive further adoption of analytics across your organization.
Tags : 
     SAS
By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : pentaho, analytics, platforms, hadoop, big data, predictive analytics
     Pentaho
By: Domo     Published Date: Dec 18, 2015
Domo brings data from any system, spreadsheet or application into a single real-time platform. Decision makers can access the data they need, when they need it, without having to wait on any reports. And it completely transforms the way you manage business.
Tags : domo, spreadsheet, system, application, platform, data
     Domo
By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
     Microsoft
By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
     Gigamon
By: Infosys     Published Date: May 30, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : data, fortress, modernize, business, applications, telecom
     Infosys
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
     Akamai Technologies
By: TIBCO Software EMEA     Published Date: Jan 17, 2019
Cloetta is a leading confectionary company in the Nordic region of Europe and The Netherlands. Cloetta manufactures and markets confectionary, chocolate products, nuts, pastilles, chewing gum, and pick and mix concepts. Its products are in more than 40 markets worldwide, with Sweden, Finland, Denmark, Norway, the Netherlands, Germany, and the UK as the main markets.
Tags : data, virtualization, solution, tool, reporting, server, reports, software
     TIBCO Software EMEA
By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : detecting unknown threats, websense, next-generation firewall
     Websense
By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects
     Websense
By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : dns< security breach, cyber security
     Akamai Technologies
By: Dell EMC     Published Date: Aug 06, 2018
Download this whitepaper for 4 reasons shorter server resfresh cycles are better for business. Analyst firm IDC reports that organizations can increase agility, improve efficiency and reduce operational costs by refreshing their servers every three years.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: HP     Published Date: Jun 24, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries.
Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup, recovery, archive
     HP
By: HP     Published Date: Jul 03, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries
Tags : 
     HP
By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : content management, customer experience management, web content management, content management systems, customer experience/engagement
     Adobe
By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : embedding reports, dashboards, analytics, saas, actuate, software application providers
     Actuate
By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
     Cisco
By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics