RSS feed Get our RSS feed

News by Topic

analysis

Results 1 - 25 of 1215Sort Results By: Published Date | Title | Company Name
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Aternity     Published Date: Dec 30, 2011
EMA provides research and analysis of today's End User Experience (EUE) and Application Performance Management (APM) technologies along with a thoughtful presentation on the Top 10 Myths to dispel before purchasing any monitoring tool. Guest speakers include Julie Craig, EMA Research Director, and Trevor Matz, President and CEO of Aternity.
Tags : technology, aternity, eue, user experience, apm, application performance, application management
     Aternity
By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence
     SPSS
By: SPSS, Inc.     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the marketing sector.
Tags : spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence
     SPSS, Inc.
By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
     Riverbed
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management
     Tripwire
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
     SunGard Availability Services
By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : cloud security, cloud solutions, data analysis, cyberattacks
     Akamai Technologies
By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
     Datawatch
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
     Concur
By: Cisco     Published Date: Apr 03, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : 
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : 
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : cloud, service, research, cisco, global, impact survey, business enabler, adoption of new technology
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : cloud, service, cisco, global, impact survey, business enabler, adoption of new technology, forecasts
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : cloud, service, cisco, global, impact survey, business enabler, adoption of new technology, forecasts
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : cloud, service, cisco, global, impact survey, business enabler, adoption of new technology, forecasts
     Cisco
By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : cloud, service, cisco, global, impact survey, business enabler, adoption of new technology, forecasts
     Cisco
By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security
     Symantec
By: LogMeIn     Published Date: Mar 19, 2015
Remote support technology, including remote control, desktop sharing, and web collaboration, is one of the most popular platforms used across TSIA service disciplines. Today’s remote support solutions offer much more than just remote control for PCs, their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards. Remote support solutions are typically well regarded by users, consistently delivering one of the highest average satisfaction scores in TSIA’s annual Global Technology Survey. Service executives should acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support. Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits. Download this white paper to learn more.
Tags : remote support, remote technology, customer support, productivity, remote technology, crm & customer care, marketing research, sales
     LogMeIn
By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
     CEB
By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : data, cost global, security
     IBM
By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, ponemon institute, jp morgan, global analysis, security
     IBM
By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, analysis, ponemon institute, security
     IBM
By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, global, ponemon institute
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics