scape

Results 176 - 200 of 1064Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Dec 18, 2018
VMware is once again positioned as a Leader in the Gartner Magic Quadrant for Hyperconverged Infrastructure. In the latest Magic Quadrant, Gartner acknowledges hyperconverged infrastructure is moving from compute and storage to a "full-stack." VMware believes it has the most trusted stack incorporating all major data center functions to deliver a single, ubiquitous control plane, agnostic of hardware. Download the report today to learn more about the hyperconverged infrastructure landscape and VMware's leading solution.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting, financial modeling, business modeling, finance what-if scenarios, financial close and consolidation, risk and audit management, erp data integration systems, adaptive insights, hyperion, anaplan, prophix, vena solutions
    
Vena Solutions
Published By: BeyondTrust     Published Date: Jul 29, 2019
Greater visibility and improved integration are vital to tackling the modern threat landscape
Tags : 
    
BeyondTrust
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This paper looks at how the cloud landscape is rapidly evolving to address the needs of critical enterprise applications. On the way, we’ll highlight some common cloud misconceptions. Finally,we’ll set out how IT leaders can create a clear, robust enterprise cloud strategy for their organizations that enables digital innovation and business transformation.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Adobe     Published Date: Mar 21, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals.
Tags : 
    
Adobe
Published By: PatSnap     Published Date: Jul 25, 2016
IP data can be used to assess new markets - analysing the vendor landscape and providing insights into future innovation. Using the drones market as an example, we did just that.
Tags : 
drones, drone, drone technology, unmanned aerial vehicles, commercial drones
    
PatSnap
Published By: Optimizely     Published Date: Apr 06, 2018
Welcome to the conversion best practices toolkit from Optimizely! You’re already one step closer to delivering meaningful digital experiences and turning prospects into customers. In an increasingly competitive landscape where customers demand more from their digital interactions with companies across a growing number of communication channels, customer acquisition can be a big challenge. In this toolkit, you’ll find a variety of resources aimed at helping you identify conversion optimization opportunities and acquire new customers with greater efficiency.
Tags : 
    
Optimizely
Published By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : 
digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data, intagible assets
    
Oracle
Published By: Schneider Electric     Published Date: Apr 24, 2019
The fourth industrial revolution is well underway. It focuses on digital transformation and creation of the Industrial Internet of Things (IIoT). A key part of this revolution is technology that enables new realities—including virtual reality (VR), augmented reality (AR), and mixed reality (MR). These new realities are already being applied in industrial settings and are poised to grow exponentially in the next few years. This storyscape dives into use cases for each type of reality and presents the benefits of each in relation to industrial automation.
Tags : 
augmented reality, industrial revolution
    
Schneider Electric
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Kuoni Travel teamed up with HP and used their TippingPoint to help customers handle threat landscape effectively, protecting both agents and customers
Tags : 
kuoni travel, hp tippingpoint, threat landscape, threats, travel
    
HP - Enterprise
Published By: iCims     Published Date: Feb 02, 2017
That’s why in this eBook, we take a look at 17 ways companies can adapt to a changing talent acquisition landscape, to ensure they can better grow their workforce today, and in the years to come.
Tags : 
    
iCims
Published By: Genesys     Published Date: Oct 16, 2013
Changes in customer behavior and expectations are causing organizations to make dramatic shifts in how they engage with customers. The requirements for a world-class contact center in this new environment have also shifted. In this white paper you’ll find five key steps to keep in mind when building a world-class contact center in today’s rapidly changing customer landscape.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm
    
Genesys
Published By: Monetate     Published Date: Sep 30, 2014
Real-time marketing is one of those buzzwords that sounds good. But, when you ask someone what it means, you get a pretty fuzzy answer. So, we decided to clarify that answer with exclusive research, produced in association with Econsultancy, that provides a snapshot of the real-time marketing landscape in 2014. Inside this report, you’ll learn how to leverage best real-time marketing practices to drive better customer experiences and increased revenue.
Tags : 
real-time marketing, exclusive research, marketing landscape, personalized messages, web analytics, business intelligence, market research, usability
    
Monetate
Published By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : 
abi. healthcare, cybersecurity, medical
    
Extreme Networks
Published By: MobileIron     Published Date: Sep 22, 2014
The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices.
Tags : 
mobile device management, enterprise mobility management, vendor landscape, it leaders, emm growth
    
MobileIron
Published By: NetApp     Published Date: Mar 05, 2018
Read this vendor assessment from IDC and find out about the suitability of 10 vendors' AFA platforms for dense mixed enterprise workload consolidation. Discover the areas where the most differentiation between vendors was noted, including their strategies around NVMe and cloud-based predictive analytics.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.