it analyst

Results 276 - 300 of 331Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
security, operations, affordability, av labs, open threat, exchange, analyst, report, research, competitive, landscape
    
AlienVault
Published By: Polycom     Published Date: Sep 18, 2015
With telecommuting and mobility on the rise in the workplace, the conference room as the main hub of collaboration is beginning to look like an archaic concept. Wainhouse Senior Analyst Andrew Davis believes it’s just the opposite. With the proliferation of video collaboration, conference rooms are actually becoming an even more integral part of the workplace.
Tags : 
telecommuting, mobility, on-demand webinar, polycom
    
Polycom
Published By: IBM     Published Date: Oct 22, 2013
Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, shares how to deliver higher quality software by increasing the efficiency and effectiveness of your testing
Tags : 
ibm, service virtualization, service volatility, identifying services to virtualize, testing phases, enternal sources, implementing services, measuring roi, test automation strategies, component behavior, enhance team productivity
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
Discover service virtualization and how it fits into the big picture of software quality.  In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost.
Tags : 
ibm, service virtualization, testing, development, test automation, user interface, quality assurance, architecture, performance, software, cost reduction
    
IBM
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup
    
Unitrends
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Xiotech     Published Date: Apr 13, 2007
Organizations face a double whammy when it comes to data archive management. On one hand, the volume of digital and paper archives is growing exponentially. Industry analysts report that digital hard disk storage has grown 85 percent a year over the last eight years and 2.7 billion new sheets of paper are filed into folders every day.
Tags : 
data archive, data management, storage, data warehousing, archive management, document search, search and retrieval, document management, document archive, xiotech
    
Xiotech
Published By: Adobe     Published Date: May 16, 2017
Programmatic advertising is full of complex patterns. Very similar to patterns in nature. Our guide, Brilliant Advertising, shows how fractals in nature perfectly describe the complexity of programmatic ads and pave the way for how you should approach creative assets. Read the guide to learn five ways to overcome challenges to programmatic ads, including how to: • Bring marketers, creatives, IT, and data analysts together to ensure success • Save money and time while improving engagement and conversion • Customize multiple versions of one campaign and serve ads with strong creative in real time
Tags : 
    
Adobe
Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
    
Aventail
Published By: DataSynapse     Published Date: Feb 26, 2007
Today's business drives application use, but it is how these applications are deployed and managed that can deliver differentiation value to the business. Whether your challenge is one of scale, optimization, heterogeneity or complexity – learn how flexibility can be built in at the application layer.  Download this analyst bulletin today!
Tags : 
application integration, desktop management, analytical applications, enterprise applications, application performance management, datasynapse, data synapse, application layer
    
DataSynapse
Published By: IBM     Published Date: May 30, 2008
This white paper, authored by industry analyst IDC, explores the problems confronting IT organizations today as they seek to bring data together from disparate sources in order to achieve better information coherence, operational efficiency, and more effective overall governance. Specifically, the paper considers the problems posed by the complexity of "data integration" technology in terms of its configuration and maintenance. It looks at the utility of a grid computing approach in providing scalability and manageability for "data integration" and considers how an appliance approach can further reduce cost and risk for customers.
Tags : 
information management, data integration, blade server, ibm, leveraging information, ibm li, li campaign
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
This Webcast is brought to you by Manufacturing Business Technology, PTC, IBM. It addresses what Companies recognize as the market trends that are driving the need for Product Lifecycle Management (PLM), and how PLM is delivered with alternative business scenarios. Key speakers are Jim Brown, President and analyst of Tech-Clarity Inc, Tom Shoemaker, VP of Solutions Marketing for PTC, and Naseem Rao, Global Solutions Executive for IBM.
Tags : 
ibm, telelogic, core business values, business continuity, change and configuration management, best practices, plm, market trends
    
IBM
Published By: MBG     Published Date: Aug 21, 2009
Telecommunications expenses are among the largest cost items on the corporate income statement. According to leading industry analysts, many companies can lower their telecommunications costs by 15 percent or more without damaging their service quality. In this white paper, MBG outlines five steps that can lead to these savings.
Tags : 
phone, telecom, telecommunications, phone bill, it spending, cost control, voip, voice over ip, communications, mbg, mgb
    
MBG
Published By: Opalis     Published Date: Nov 06, 2006
Automating repetitive Data Center Operations into best practices makes response times faster, more reliable, and less costly. Learn how to extend your current IT systems to do more of the routine work, freeing up IT staff for higher-value projects.
Tags : 
process automation, automation, business process automation, bpa, data centers, datacenter, datacenters, response time, cost control, spending, it automation, analyst report, opalis
    
Opalis
Published By: Winshuttle     Published Date: Dec 04, 2006
This paper describes 7 best practices that many companies have adopted in automating the upload of Excel data into SAP. Adopting these best practices will alleviate many of the pains that business users and IT analysts face in uploading Excel data to SAP.
Tags : 
excel, sap, spreadsheet, spreadsheets, best practice, best practices, sap data, data entry, data management, data upload, winshuttle
    
Winshuttle
Published By: SOCRATIQ Intelligence Systems     Published Date: Feb 14, 2007
This White Paper discusses how intelligence agency management can apply machine translation as a much-needed support tool that can make linguists and intelligence analysts more effective in producing meaningful and actionable results.
Tags : 
translation, terrorists, homeland security, language, socratiq, voice recognition, business management, cia, information management, analytical applications, homeland, tongue, socratiq
    
SOCRATIQ Intelligence Systems
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa, productivity, adaptive soa, soa, service oriented architecture, service-oriented
    
Ultimus
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Network Automation     Published Date: Dec 02, 2008
Every night for several years, the five Latin America offices of Michigan-based medical technology products manufacturer Stryker Corporation were forced to burn the midnight oil to turn their daily financials into a single consolidated report. Each office has its own independent ERP system, so the process required three hours to compile the data for each territory plus another 90 minutes for a financial analyst at division headquarters to merge the five spreadsheets into one document.
Tags : 
network automation, automate professional, erp
    
Network Automation
Published By: NetApp     Published Date: Apr 27, 2010
Close collaboration between NetApp, Cisco, and VMware has resulted in the industry's first secure multi-tenancy solution to partition shared IT infrastructure which delivers performance, availability, and responsiveness, while maintaining cost efficiencies. Download this exclusive report from analyst ESG to learn more.
Tags : 
netapp, esg report, it infrastructure, secure multi-tenancy, security, virtualized data center, vmware, cisco, server virtualization
    
NetApp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.