RSS feed Get our RSS feed

News by Topic

research analysis

Results 1 - 25 of 83Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Feb 03, 2017
The SAP HANA platform provides a powerful unified foundation for storing, processing, and analyzing structured and unstructured data. It funs on a single, in-memory database, eliminating data redundancy and speeding up the time for information research and analysis.
Tags : 
     SAP
By: Cisco     Published Date: Jul 30, 2015
Attaining value
Tags : cisco, network management, network management, business practices, research analysis, branding, data management/analytics
     Cisco
By: HP Enterprise Business     Published Date: Mar 02, 2017
Powered by data from 451 Research, the Right Mix web application benchmarks your current private vs public cloud mix, business drivers, and workload deployment venues against industry peers to create a comparative analysis. See how your mix stacks up, then download the 451 Research report for robust insights into the state of the hybrid IT market.
Tags : 
     HP Enterprise Business
By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: Dell EMC & Intel     Published Date: Aug 03, 2018
When running core workloads, consider hyper-converged infrastructure. Solutions like Dell EMC VxRail simplify operations and significantly reduce TCO. Recent research from Evaluator Group shows how VxRail compares to AWS On-Demand: Learn how to lower TCO with Evaluator Group’s full analysis
Tags : 
     Dell EMC & Intel
By: Dell     Published Date: Aug 11, 2015
Read this report to learn discover the five key areas in which enterprise customers highly value a notebook vendor.
Tags : 
     Dell
By: SAS     Published Date: Oct 22, 2015
The Internet of Things (IoT) presents an opportunity to collect real-time information about every physical operation of a business. From the temperature of equipment to the performance of a fleet of wind turbines, IoT sensors can deliver this information in real time. There is tremendous opportunity for those businesses that can convert raw IoT data into business insights, and the key to doing so lies within effective data analytics. To research the current state of IoT analytics, Blue Hill Research conducted deep qualitative interviews with three organizations that invested significant time and resources into their own IoT analytics initiatives. By distilling key themes and lessons learned from peer organizations, Blue Hill Research offers our analysis so that business decision makers can ultimately make informed investment decisions about the future of their IoT analytics projects.
Tags : 
     SAS
By: Adobe     Published Date: Nov 07, 2013
Aberdeen's Insights provide the analyst's perspective on the research as drawn from an aggregated view of research surveys, interviews, and data analysis.
Tags : adobe, aberdeen group, analyst insight, technology tools, buying behavior, customer experience management, cem, buyer interactions
     Adobe
By: Red Hat     Published Date: May 01, 2012
Forrester Research makes a case for migrating from proprietary operating system environments to Red Hat Enterprise Linux. In-depth interviews with an existing customer and subsequent financial analysis highlight the positive risk-adjusted return on investment (ROI), costs, and benefits of making the switch.
Tags : economic impact, red hat, investment, costs
     Red Hat
By: SAP     Published Date: Dec 04, 2015
In May of 2015, CFO Research conducted a global survey of senior finance executives at large companies, seeking to better understand how finance leaders aspire to support business decision makers in the pursuit of value creation—and how leading-edge financial planning and business analysis capabilities factor into those aspirations. This report is based on 335 survey responses from senior finance executives at companies with more than US$500 million in annual revenues, representing a broad range of company segments.
Tags : financial planning and analysis, fp&a, finance leaders, business decision makers, business analysis capabilites
     SAP
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
     Entrust Datacard
By: FireEye     Published Date: Nov 27, 2012
The FireEye®Advanced Threat Report for the first half of 2012 is based on research and trend analysis conducted by the FireEye Malware Intelligence Lab.
Tags : fireeye, threat report, malware, fireeye advanced threat report 1h 2012, email-based attacks., security
     FireEye
By: join.me     Published Date: Jul 10, 2015
Collaboration is key. This report combines quantitative research sponsored by join.me by LogMeIn and a range of other prominent research firms with qualitative analysis conducted by Forbes Insights.
Tags : collaboration tools, online meetings, virtual meetings, collaboration, benefits of collaborative tools, teamwork, webinars & web conferencing, crm solutions/software
     join.me
By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Juniper Networks     Published Date: Oct 20, 2015
RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors.
Tags : juniper, cybercrime, data, narkets, research, analysis, security
     Juniper Networks
By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
     WNS
By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage
     LogLogic
By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : talent risks, talent issues, talent management, development roi
     CEB
By: Brainshark     Published Date: Dec 08, 2015
New research from Forbes Insights and Brainshark reveals how top-performing sales teams attack the sales productivity problem.
Tags : forbes report, sales enablement research, sales enablement reports, sales productivity problems, sales enablement, sales enablement analysis, cmo, emerging marketing
     Brainshark
By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : abi. healthcare, cybersecurity, medical
     Extreme Networks
By: Dassault Systèmes     Published Date: Jul 25, 2017
There is a large gap between understanding how important project management is to a successful product launch and how effective a company may be with its actual execution. John Hayes, CEO of Engineering.com, and Jon Gable, former Strategic Planning Director for Dassault Systèmes , team up to bring you a webinar on product development and project management tools. This webinar covers: • Research report findings from 140 product development professionals • Analysis of how product development issues can be addressed • Web-based project management for product development Gain insight into the latest thinking on project management for product development and how project management issues can impact business at the highest level.
Tags : project management, company optimization, execution, product development, research report, web based, business impacts
     Dassault Systèmes
By: IBM     Published Date: Oct 17, 2016
Why do organizations seek to design effective multi-channel customer journeys? Because customers today demand it. Download this research study from Hypatia Research Group to learn how global organizations are successfully utilizing various analytical techniques like descriptive, diagnostic, predictive, prescriptive and cognitive analysis to create a successful omni-channel customer journey.
Tags : ibm, commerce, analytics, customer analytics, insights, research, customer journey
     IBM
By: IBM     Published Date: Feb 27, 2017
Why do organizations seek to design effective multi-channel customer journeys? Because customers today demand it. Download this research study from Hypatia Research Group to learn how global organizations are successfully utilizing various analytical techniques like descriptive, diagnostic, predictive, prescriptive and cognitive analysis to create a successful omni-channel customer journey.
Tags : hypatia research group, cognitive analysis, predictive analysis, customer journey
     IBM
By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics