it analyst

Results 226 - 250 of 332Sort Results By: Published Date | Title | Company Name
Published By: Pentaho     Published Date: Jan 16, 2015
This ebook is recommended for IT managers, developers, data analysts, system architects, and similar technical workers, who are faced with having to replace current systems and skills with the new set required by NoSQL and Hadoop, or those who want to deepen their understanding of complementary technologies and databases. Sponsored by Pentaho.
Tags : 
big data, hadoop, data delivery
    
Pentaho
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Aug 16, 2012
This report defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
    
Sponsored by HP and Intel® Xeon® processors
Published By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : 
data breaches, data center, security, cyber threats, server, business continuity
    
Bit9
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Cisco     Published Date: Sep 08, 2016
The following questions in this white paper were posed by Cisco to Nolan Greene, research analyst with IDC's Network Infrastructure group, on behalf of Cisco's SMB customers.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Jun 08, 2016
"Unified communications (UC) has been a market in the making for well over a decade, as companies look to improve corporate collaboration. One of the software leaders in the UC space is Microsoft. As organizations look past IM and presence to explore other productivity and efficiency gains that might come with Skype for Business integration, the next logical step is Enterprise Voice. In this brief, you’ll gain valuable insight into the following 3 common questions companies ask before deploying Skype for Business Enterprise Voice: 1. What are the risks of deploying Skype for Business Enterprise Voice? 2. What is the quality of Skype for Business Enterprise Voice? 3. How can Skype for Business Enterprise Voice transform my company? Step inside this whitepaper for guidance from UC industry analyst, ZK Research. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
    
Polycom
Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions
    
IBM
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
US ground forces handle massive amounts of information and data while working under unpredictable conditions. These conditions don’t always allow military intelligence analysts access to a technologically reliable way to share information.  AI can help develop a comprehensive intelligence picture and a true sense of cognitive situational understanding (CSU). These technologies can help analyze the massive amounts of data the military receives. And because AI programs are constantly adding new capabilities and tools, they can help the military prepare for the battlefield of the future. Read how. 
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Aug 28, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : 
data storage, data value, ilg, data disposal
    
IBM
Published By: IBM     Published Date: Oct 22, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : 
data storage, big data, data disposal, data value
    
IBM
Published By: IBM     Published Date: Jan 16, 2015
Watch this video with Bryan Ball, Vice President and Principal Analyst for Supply Chain Management with the Aberdeen Group to find out why so many companies are turning to B2B collaboration to reduce costs, increase margins, and keep up with the escalating pace of business.
Tags : 
ibm, b2b integration, b2b collaboration, business decision making, supply chain management, cost reduction
    
IBM
Published By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : 
internet of things, product development, time to market, data analysis
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Digital Transformation. Agile applications. Open source software. Join IDC analyst Al Gillen as he presents IDC's view of what they mean for applications, infrastructure - and customers.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
Digital Transformation. Agile applications. Open source software. Join IDC analyst Al Gillen as he presents IDC's view of what they mean for applications, infrastructure - and customers.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: IBM     Published Date: Apr 27, 2017
It’s hard to grow your business if you can’t see what’s coming next. What will the demand be for a specific product or service and how should you adjust production? What revenue can be expected and from which channels? Where are the best areas to expand your business? Predictive analytics can provide the answers executives, analysts and business managers need to reduce costs, operate more efficiently and increase the bottom line. Join IBM SPSS and guest Mark Lack, Manager of Strategy Analytics and Business Intelligence with industrial products company Mueller Inc. for a look at how to decrease costs and improve your business’ profitability with predictive analytics. You’ll learn how Mueller extends the value of its Big Data environment by applying predictive techniques to accurately forecast sales, prevent fraud and reduce losses from damaged inventory, saving the company significant time and money.
Tags : 
predictive analytics, fraud detection, increase revenue, decrease costs, customer retention, hr efficiency, advanced analytics
    
IBM
Published By: IBM     Published Date: Nov 30, 2017
Analyst firm, Enterprise Strategy Group (ESG), makes the case for storing backup, archive and content repository data in the cloud. Learn how IBM Cloud Object Storage addresses these use cases and helps companies lower costs, provide higher availability and protect against unauthorized access to their data. Complete the form to download the analyst paper
Tags : 
ibm cloud, archival solutions, ibm, it services, storage, production storage, data management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: IAG Consulting     Published Date: Feb 13, 2009
Great Requirements are Free is a new idea in webcasts: It recognizes that everyone from executive to analysts are busy and can’t always free up the time to view a forty-five minutes to one hour session during the day. Micro casts are short, hard-hitting, and informative sound-bites on critical issues. We guarantee it will be a productive 10 minutes in your day.
Tags : 
iag consulting, keith ellis, cost savings, requirements, micro cast
    
IAG Consulting
Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions
    
Vision Solutions
Published By: IBM     Published Date: Apr 17, 2013
This January 2013 analyst paper features the advantages of IBM SmartCloud Storage Access and its value to customers who want to implement a private cloud solution. The answer to these organizations is IBM SmartCloud Storage Access (SSA), which lets organizations turn on-premise storage systems including SONAS and/or Storwize V7000 Unified Storage into powerful private clouds. The cloud-based storage services created by SmartCloud Storage Access combines the scale-out and unified features of the underlying storage systems into highly flexible and manageable cloud-based storage.
Tags : 
smart, storage, cloud, ibm, analyst, organizations, sonas, services
    
IBM
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.