RSS feed Get our RSS feed

News by Topic

search

Results 276 - 300 of 2924Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Oct 24, 2018
The report combines data from a February 2018 executive survey of 401 email marketers and documented ESP demos related to three key themes. We also utilized vendor questionnaires and our near two-decades of knowledge of the providers in this sector. One-on-one phone interviews with several of the marketers who use these tools and our executive survey clients provided satisfaction data. The methodology details our entire recipe, but readers can feel confident in knowing that our vendor evaluation process is objective and does not stem from one analyst’s singular point of view. This guide also includes our analysis and perspective on vendors that did not for a variety of reasons participate in this research.
Tags : 
     Adobe
By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : office 365, it security, cybersecurity, web security, phishing, microsoft office
     Cyren
By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : office 365, it security, cybersecurity, web security, phishing, microsoft office
     Cyren
By: NetApp     Published Date: Oct 12, 2018
Big data needs both high availability and protection. The amount of data created and replicated globally is predicted to increase ten-fold by 2025, according to IDC research. You may be wondering where to store that big data, as well as how to ensure your data is highly available and protected. In this eBook, explore why cloud-based disaster recovery (DR) improves data availability, eases the processes associated with DR management, and creates a more economically efficient solution for today’s data-driven companies.
Tags : 
     NetApp
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: Workday     Published Date: Oct 11, 2018
Read the latest Gartner Magic Quadrant for Cloud HCM Suites to get a side-by-side comparison of key HCM vendors and learn why the world’s leading research and advisory company named Workday a leader for the third year in a row.
Tags : 
     Workday
By: Adobe     Published Date: Oct 11, 2018
in our 24-criteria evaluation of experience optimization platform (EoP) providers, we identified the eight most significant ones — Adobe, dynamic Yield, Evergage, Monetate, optimizely, oracle, sAs, and sitespect — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (Ci) professionals make the right choice.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 11, 2018
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, evergage, google, IBM, localytics, Mixpanel, optimizely, sAs, and Webtrekk — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
     Adobe
By: Carbonite     Published Date: Oct 10, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016
Tags : 
     Carbonite
By: Carbon Black     Published Date: Oct 10, 2018
According to ESG Research, 65% of organizations believe the skill level of their security team could be improved, and 48% are using more than 25 security products. This leads to more overworked staff and, ultimately, less effective security. Download the Replace AV Buyer's Guide to learn what your team should look for when replacing legacy AV with an endpoint security solution that is easy to manage and deploy, and can cost-effectively protect your growing business. In this buyer's guide you'll find: A core evaluation checklist for replacing AV. Guiding questions to frame your evaluation to replace AV. How to run a test of next-generation AV solutions. Learn more about replacing your traditional AV in the Replace AV Buyer's Guide.
Tags : 
     Carbon Black
By: Zerto     Published Date: Oct 08, 2018
"Gartner’s SWOT on Zerto examines Zerto’s position as a top provider for enterprise disaster recovery and IT Resilience. This informative, enlightening report from Gartner, the world’s preeminent research and advisory firm, will help business leaders like you make informed decisions about using Zerto solutions to achieve IT resilience. The Gartner SWOT on Zerto covers: In-depth 3rd party Analysis Recommendations on Zerto Use Cases Beyond Disaster Recovery Implications for Your Business Download the Gartner SWOT analysis to help guide you as you navigate the next steps for your organizations path to IT resilience!"
Tags : gartner, resilence decision-making, hybrid cloud
     Zerto
By: Uberall     Published Date: Oct 08, 2018
Research shows that today’s in-store purchases tend to begin and end online. Even ready-tobuy consumers research online for nearby stores, go in-store to buy, and often leave a review about their experience. In turn, those reviews influence the purchasing decisions of your future customers. This makes it crucial for businesses to have a voice in those conversations, monitoring and responding to reviews and comments.
Tags : customer, store, consumer, business, read-to-buy, local marketing, reputation management
     Uberall
By: Uberall     Published Date: Oct 08, 2018
Did you know that for 88% of shoppers, the first step to a local purchase is often an online search? If you want customers to find you, you must have a consistent, rich and engaging online brand that is equally optimized for both desktop and mobile SEO, and that contains long tail keywords for voice search assistants like Siri, Alexa, Cortana, and Google Voice. Be sure to claim and regularly maintain your listings for every widely used portal and social site, and create a separate locator page for every single location—so that you show up at the top of all local searches.
Tags : mobile, shoppers, customers, seo, uberall, local marketing, location marketing, near me searches
     Uberall
By: Uberall     Published Date: Oct 08, 2018
A few years ago many pundits were ringing the death knell for brick and-mortar stores. Shops— and even walk-in services—they told us, would soon be eclipsed and pushed out by the massive online giants. No one would be shopping in the real world anymore. They couldn’t have been more wrong.
Tags : mobile, shoppers, services, uberall, local marketing, location marketing, near me searches
     Uberall
By: Herman Miller     Published Date: Oct 04, 2018
As workplace researcher Robert Propst observed in A Facility Based on Change, “Not only must we accept change, we must adjust to accelerated growth.” If your office doesn’t reflect who you are now and who you hope to become in the future, accelerated growth can feel especially painful. Whoever you are, you can’t escape change. But we think that workplaces can actually be catalysts for growth without all the growing pains. Whether you’re trying to spark innovative thinking or encourage people to work together more efficiently, you can reach your goals with a workplace tailored to your unique needs. We’ve been capturing workplace data and transforming it into growth-enhancing insight since Propst began studying the connections between people, work, and the workplace nearly 50 years ago. This legacy of workplace research—in combination with the research we do today—informs Living Office®, a research-based placemaking approach that ignites powerful workplace transformations. With Living Of
Tags : 
     Herman Miller
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
     Akamai Technologies
By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
     Cohesity
By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
     PGi
By: Civica Digital     Published Date: Sep 28, 2018
If there’s one thing that stands out about central government, it’s the appetite for digital transformation. Whether delivering new customer-facing websites to drive better engagement with services or establishing a centre of excellence to accelerate the take-up of robotic process automation (RPA), UK government is embracing opportunities to modernise with new technologies. But despite the great strides made in the last few years, the UK is slipping backwards in E-Government development terms – down from #1 in 2016 to #4 in 2018, according to the UN E-Government Survey 2018. Some argue this is due to the government having tackled the more straightforward digitisation opportunities and because it is now facing the bigger, more complex systems that need modernising. Our research shows that there are also wider challenges, including uncertainty around the impact of Brexit, budgetary pressures and emerging technologies, coming into play. So what needs to happen to overcome our challenges
Tags : 
     Civica Digital
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics