RSS feed Get our RSS feed

News by Topic

gartner

Results 201 - 225 of 685Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jan 31, 2013
Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : endpoint protection, security, overview
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec Endpoint Protection 12 positioned as a Leader in 2013 Gartnerís Magic Quadrant Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartnerís Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: F5 Networks Inc     Published Date: Nov 05, 2014
F5 Networks is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year. The application delivery controller (ADC) is a key component within enterprise data center and public cloud architectures, and according to Gartner, enterprises should evaluate ADCs based on how they integrate with key applications and cloud/virtualization platforms.
Tags : application control, application delivery, adc, enterprise data center
     F5 Networks Inc
By: IBM     Published Date: Feb 11, 2015
IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.
Tags : application security testing, application security, ibm, iast, binary code, security
     IBM
By: MobileIron     Published Date: Jul 03, 2014
Every year Gartner evaluates the enterprise mobility management vendors on their completeness of vision and ability to execute. This criteria is used to place vendors into one of four quadrants. For the fourth consecutive year MobileIron has been placed in the Leaders quadrant. According to Gartner, "The hallmark of leaders is that they focus and invest in their offerings to the point that they lead the market and can affect its overall direction." Download to learn more!
Tags : mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone
     MobileIron
By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : ibm, gartner, magic quadrant, identity governance, administration, security
     IBM
By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : mobile security, mobile risks, device attacks, network attacks, malware attack
     Lookout
By: SnapLogic     Published Date: Aug 17, 2015
Five key drivers to engage stakeholders of data and application integration disciplines to articulate, intersect and work together.
Tags : converging applications, data integration, deployment costs, saas, application integration, data analysis, integration technologies, stewardship
     SnapLogic
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: NetApp     Published Date: Jun 03, 2016
Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: NetApp     Published Date: Aug 26, 2016
Gartner: Moving Toward the All Solid-State Storage Data Center Are you only using solid-state arrays for your primary data? If so, youíre missing out on the benefits flash can deliver to other applications, such as active archives, data lakes, and big data infrastructures. In this independent report, Gartner finds that progressive I&O leaders are already moving toward an all solid-state data center and predicts that others will soon follow. Read the report here.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's ďLeadersĒ quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security
     Veracode
By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection
     Intel Security
By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply canít secure what you canít see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organizationís cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply canít secure what you canít see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organizationís cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
     Gigamon
By: Alteryx, Inc.     Published Date: Sep 06, 2017
In order to improve competitive advantage, decision making, and operational efficiencies, many of todayís leading organizations are creating an Office of the Chief Data Officer. According to Gartner, ď90 percent of large companies will have a CDO role by the end of 2019Ē.
Tags : 
     Alteryx, Inc.
By: HP and Intel ģ     Published Date: May 27, 2014
This checklist is designed to avoid getting onto a straight and narrow path that provides little flexibility to branch out and merge with other IT strategies and visions.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises
     HP and Intel ģ
By: HP     Published Date: May 27, 2014
This checklist is designed to avoid getting onto a straight and narrow path that provides little flexibility to branch out and merge with other IT strategies and visions.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises
     HP
By: Cisco     Published Date: Sep 25, 2014
IT leaders are likely to need multiple UC vendors; however, changing expectations and product development are closing the gap between best-of-breed and good-enough technology. Assess your UC practices to see whether the features offered by your UC vendor are good enough for a single-vendor approach.
Tags : quadrant, unified, communications, solutions, operate, enterprises, practices, markets
     Cisco
By: Sitecore     Published Date: Mar 04, 2016
Start your WCM selection process by documenting your goals and desired outcomes to refine your definition of success. Then prioritize use cases according to your goals, and use this report to identify the WCM system that best matches your needs. Register today!
Tags : 
     Sitecore
By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
     SAP
By: IBM     Published Date: May 17, 2016
Selecting horizontal portal software is increasingly difficult because of the expanding scope and increasing overlap among products and vendors. IT application leaders will have to understand the capabilities that matter most in support of their desired business outcomes.
Tags : ibm, gartner, horizontal portals, business outcomes
     IBM
By: IBM     Published Date: Oct 12, 2016
Read this online report that can aid your horizontal portal selection decisions and help you identify key differentiators among products.
Tags : ibm, commerce, digital experience, digital, horizontal portals
     IBM
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store
     Intel Security
By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
Solid-state array features, pricing, scale and density are improving at a rapid pace, while agility and disaggregation benefits are providing long-term value. Gartner has analyzed 19 SSA products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
     Hewlett Packard Enterprise
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics