analysis

Results 101 - 125 of 1254Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : 
akamai, ddos, web application attacks, ntp, akamai intelligent platform
    
Akamai Technologies
Published By: IBM APAC     Published Date: Jun 07, 2017
This Total Economic Impact (TEI) analysis has been prepared exclusively for you based on your inputs. The analysis provides a high-level estimate of the impact of implementing IBM customer behavior analytics solutions.
Tags : 
customer experience, customer analytics, customer behavioural analytics, customer experience management
    
IBM APAC
Published By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, the IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report identifies the challenges faced by financial services industry today and how VCE’s Vblock Systems are being used to address them.
Tags : 
vce, vblock systems, idc analysis, innovation, customer experience, it solutions, financial benefits
    
EMC Converged Platforms
Published By: Pega     Published Date: May 03, 2016
Download this Gartner Magic Quadrant analysis for BPM platform-based case management frameworks and gain a better understanding of the solutions offered by each BPM vendor.
Tags : 
    
Pega
Published By: Cisco     Published Date: Apr 03, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2014
This Cisco Survey provides an important summary and analysis of worldwide results.
Tags : 
cloud, service, research, cisco, global, impact survey, business enabler, adoption of new technology, forecasts, report, survey
    
Cisco
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Thomson Reuters     Published Date: Jul 30, 2012
Thomson Reuters QA Studio, powered by Palantir, provides easy and rapid financial time series analysis, multi-asset class portfolio simulation, factor testing, and other portfolio analytics.
Tags : 
starmine, equity, trading, strategy, financial, tool, long, portfolio, s&p, strategy, volatility, backtesting, rebalancing, asset management, investment software, financial advisors, finance
    
Thomson Reuters
Published By: FireEye     Published Date: Nov 27, 2012
The FireEye®Advanced Threat Report for the first half of 2012 is based on research and trend analysis conducted by the FireEye Malware Intelligence Lab.
Tags : 
fireeye, threat report, malware, fireeye advanced threat report 1h 2012, email-based attacks.
    
FireEye
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology
    
BMC Software
Published By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
social media, business intelligence, customer hub, crm, oracle
    
Oracle
Published By: SAP     Published Date: Nov 06, 2015
This report, based on a survey of over 200 organizations, illustrates that cloud users are looking for a new generation of cloud solutions which are simple, highly collaborative, and enable high performing Financial Planning and Analysis (FP&A) processes featuring accuracy and effectiveness.
Tags : 
cloud financial planning and analysis, fp&a, cloud users, cloud solutions, finance
    
SAP
Published By: SAP     Published Date: Nov 16, 2015
This report, based on a survey of over 200 organizations, illustrates that cloud users are looking for a new generation of cloud solutions which are simple, highly collaborative, and enable high performing Financial Planning and Analysis (FP&A) processes featuring accuracy and effectiveness.
Tags : 
    
SAP
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 03, 2019
Upgrades, upgrades, upgrades. Everyone is making them and so you ask yourself: Should your business upgrade systems, too? It seems like there’s always a newer version or better software out there. Yet while implementing new and improved systems can help your business scale and save your company money, it’s important to know whether new software is worth the transition. Zendesk recently commissioned Forrester Consulting to conduct a study that evaluated the financial impact of Zendesk on organizations. Forrester interviewed five customers and conducted a financial analysis. In this study, Forrester lays out the benefits and costs of Zendesk’s family of customer service products, with the analysis pointing to benefits of more than $3.8 million.
Tags : 
    
Zendesk
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Symantec     Published Date: Jul 09, 2017
This paper describes how malware is evolving, how it functions, and how it can be identified, neutralized, and blocked by what we refer to as cloud generation malware analysis, which is available as a robust enterprise cloud service. Let’s start with how the blizzard of advanced malware alarms is affecting IT security teams.
Tags : 
cloud, malware, threat and vulnerability management, security
    
Symantec
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Published By: Prophix     Published Date: Jun 03, 2016
Discover how best-in-class organizations are using financial consolidation as the catalyst to better strategic financial analysis and business decision making. Learn about how the best finance operations deliver faster, more accurate and more automated close and consolidations. Hear about Space Saver a Prophix customer and how his company uses Prophix for financial consolidation and to help them plan their product inventories, their product discounting strategies, and their product mix.
Tags : 
financial consolidation, best practices, prophix, productivity, competitive advantage
    
Prophix
Published By: Prophix     Published Date: Jun 03, 2016
Prophix financial consolidation is the springboard to strategic financial analysis and better business decision making.
Tags : 
best practices, financial consolidation, financial analysis, prophix
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Watch how Prophix empowers you with monitoring reports and analytics to support a continuous process that involves the input of employees from across the organization. With Prophix, you can evaluate your corporate performance from both high-level and granular views. And by ensuring that you keep an eye on the alignment of business goals and the company’s progress, you will enjoy a valuable tool for facilitating informed decision making.
Tags : 
prophix, best practices, productivity, business analysis
    
Prophix
Published By: Prophix     Published Date: May 31, 2016
Prophix gives you a clear picture of all your operational costs and connects them with key factors that are driving your revenues. That increased line-of-sight is made possible because Prophix tracks and monitors all day-to-day operational planning activities. Improving operational outcomes for the short-term and providing insights into your future operations
Tags : 
prophix, best practices, database management, productivity, business analysis
    
Prophix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.