RSS feed Get our RSS feed

News by Topic

vendor landscape

Results 26 - 50 of 63Sort Results By: Published Date | Title | Company Name
By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
     Birst
By: MuleSoft     Published Date: Apr 17, 2017
MuleSoft Positioned as a Leader 4 Years in a Row Read this complimentary copy of the 2017 Gartner Magic Quadrant for iPaaS, and find out why MuleSoft was named a Leader based on completeness of vision and the ability to execute. Read on to learn: Expert perspectives on the iPaaS vendor landscape Critical analysis of key differentiators Latest developments in integration technology Industry benchmarks and trends
Tags : mulesoft, leader, industry benchmarks, gartner magic quadrant
     MuleSoft
By: Workterra     Published Date: Oct 03, 2017
The world of employee benefits is changing as much for insurance agencies and brokers as it is for employers and HR and benefits leaders. Everyone is dealing with uncertainty over affordable care mandates, ever-complicated benefits administration and HCM technology options, and blurred lines among HR vendors and insurance companies and brokers. Despite that changing landscape around employee benefits, HR and insurance brokers, agencies, and consultants can all win when they have a friend in the world of HR technology — a friend who understands and can respond to the challenges that everyone in the equation is facing today.
Tags : 
     Workterra
By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : security, technology, best practices, information technology
     LogRhythm
By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : security, security application, siem, siem architecture, it security managers
     Logrhythm
By: Gleanster Research     Published Date: Nov 21, 2013
This benchmark report from Gleanster Research showcases the benefits of Online Customer Community Solutions. You'll learn what to look for, how to overcome challenges, as well as analyst commentary on the full vendor landscape.
Tags : 
     Gleanster Research
By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector
     BitSight Technologies
By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
     Cherwell Software
By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
     CrowdStrike
By: VMware     Published Date: Dec 18, 2012
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users.
Tags : virtualization, process management, cloud, operations management, viom, infrastructure operations management
     VMware
By: Silver Peak     Published Date: Feb 12, 2013
If you find yourself in need of a WAN optimization solution you’ll want to download this report to understand what’s new in the WAN optimization market, what vendors are the key players, and which products are most appropriate for your needs.
Tags : wan, virtualization, optimization, data center, network
     Silver Peak
By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod
     IBM MaaS360
By: SAP     Published Date: Apr 14, 2011
Display marketers are eager to launch mobile campaigns. But they face challenges such as audience fragmentation, a chaotic vendor landscape, and myriad new technologies and devices. In order to navigate these challenges, we recommend that marketers focus on creating convenient mobile experiences by building mobile display campaigns that are simple, immediate, and contextually relevant to the section of their audience most likely to use them.
Tags : mobile display, melissa parrish, mobile marketers, tracking, audience fragmentation, mobile campaign, mobile experience, forrester
     SAP
By: SAS     Published Date: Mar 06, 2018
Industry leaders from the banking and vendor landscape are working to streamline the customer experience while closing the opportunities for fraud and exposure. Balancing security and convenience will require an approach that combines consumer-facing authentication (such as passwords, PINs and biometrics) with background security measures (such as transaction and session-behavior analytics).
Tags : 
     SAS
By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : social intelligence, marketing, social media, gleanster, business intelligence, market research, usability, social media marketing
     Gleanster
By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 26 pages and is based on the experiences of 319 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 47 technology solution providers.
Tags : gleanster, marketing, email marketing, personalization, b2b, customers, email campaigns, web analytics
     Gleanster
By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : gleanster, business, benchmark, business intelligence, roi, customer experience/engagement, market research, usability
     Gleanster Research
By: Dell Software     Published Date: May 28, 2013
If your IT isn’t 100% virtualized, you’re stuck managing backups both for virtual and physical. So how do you balance ease-of-use with staying ahead of the curve? We drew upon the best research to help you find the optimal solution for your organization: Vendor Landscape: Virtual Backup Software.
Tags : dell quest, data backup, virtual backup, backup software, vendor landscape
     Dell Software
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: IBM     Published Date: Jul 20, 2016
This report maps out the vendor landscape for social collaboration technologies, to help you understand where you need to start, and what you should be looking for in a vendor to maximize success with your initiative.
Tags : ibm, enterprise social solutions, enterprise solutions, mwd advisors, social collaboration, vendors, vendor offerings, social collaboration technology
     IBM
By: CollabNet     Published Date: Mar 30, 2012
As development platforms, coding methodologies, and devices increase in number, Agile Application Life Management (ALM) tools support integrations with an ever-increasing range of systems.
Tags : 
     CollabNet
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
     Group M_IBM Q1'18
By: Focus     Published Date: Aug 04, 2011
Find out what you must consider before purchasing BI software and learn which vendor has the solution you need. Download your FREE Focus Experts Briefing now!
Tags : focus bi, business intelligence, bi software, vendor landscape, bi software market, experts briefing
     Focus
By: Gleanster Research     Published Date: Jul 08, 2014
The report includes a comprehensive vendor landscape with vendor rankings based on 4 dimensions – Ease of Deployment, Ease of Use, Features and Functions, & Overall Value. Plus, the vendor rankings are informed by actual user reviews.
Tags : gleanster, customer relationship management, crm, smb, marketing automation, crm platforms, smb marketplace, customer engagement
     Gleanster Research
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics