HIT Consultant Insightful coverage of healthcare innovation
 

criteria

Results 351 - 375 of 377Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corp.     Published Date: Sep 10, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e- commerce platform-which should be the last e-commerce platform you ever need to buy.
Tags : 
oracle, e-commerce, technical considerations, platforms
    
Oracle Corp.
Published By: IBM Software     Published Date: Oct 05, 2010
Ray Wang of The Altimeter Group explores the IT and business criteria organizations must consider when planning their next BI deployment.
Tags : 
ibm cognos, business analytics, business intelligence strategy, bi deployment, information management matrix
    
IBM Software
Published By: ScriptLogic     Published Date: Aug 18, 2011
One of the biggest complexities in desktop management is the fact that no organization has a single desktop configuration and need. There should and there is a better way. Download this whitepaper to find out more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria
    
ScriptLogic
Published By: ScriptLogic     Published Date: Aug 23, 2011
Free Whitepaper | The Definitive Guide to Logon Script Replacement
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria
    
ScriptLogic
Published By: OSF Global Services     Published Date: Feb 03, 2011
You've selected your CRM software. Now what? This white paper offers guidance on how to choose the CRM implementation service provider best suited to small and midsized businesses.
Tags : 
crm implementation, crm integration, installing a crm, implementing a crm
    
OSF Global Services
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services, stocks, equities, filtering companies, filter, electronic trading, back-office
    
ETNA Software
Published By: Eloqua     Published Date: Jan 19, 2012
Marketing has long worked to support their sales teams by providing them with a steady flow of qualified leads. The use of agreed upon criteria for defining a qualified lead has resulted in a reduction of historical challenges in lead follow-up, but has yielded high volumes of unqualified leads.
Tags : 
eloqua, marketing, marketing automation, sales, sales support, lead volume
    
Eloqua
Published By: CloudDocs by eGistics, Inc.     Published Date: Sep 30, 2011
This paper identifies important criteria for gathering user requirements for an EDMS project.
Tags : 
    
CloudDocs by eGistics, Inc.
Published By: AtTask     Published Date: Feb 11, 2012
Regardless the structure of your projects and work, the right work management approach can be the formula for success in your organization. This easy to read, 3 page guide, will introduce you to this formula.
Tags : 
successful project techniques, project management success, achieving business success, project management techniques, project success, project success criteria, project success factors, measuring project success, it project success
    
AtTask
Published By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : 
endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network
    
Endace
Published By: Adobe     Published Date: Mar 11, 2013
In Forrester's 53-criteria evaluation of online testing platform vendors, we identified the seven most significant providers in the category and researched, analysed, and scored them.
Tags : 
online testing platforms, multichannel marketing, customer experience management, customer experience, digital marketing
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry
Published By: McAfee     Published Date: Apr 10, 2013
This report details Forrester's findings about how well each vendor fulfills the 47-criteria evaluation and where each vendor stands in relation to each other to help security and risk professionals select the right partner for their email content security solution.
Tags : 
email content security, email encryption, forrester wave, on premises, saas, email security management, mcafee email gateway
    
McAfee
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow, it help desk, cloud-based solutions, saas solutions, it service desk, asset management, it service portfolio, it service catalog, itil software, it solutions, it software, it technology
    
Samanage
Published By: Pega     Published Date: Sep 11, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their RTIM needs.
Tags : 
    
Pega
Published By: Polycom     Published Date: Feb 16, 2017
" Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes; Small/Huddle Rooms Teaming Rooms Standard Meeting Rooms Executive Boardrooms Reconfigurable Spaces Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now."
Tags : 
polycom, business technology, wainhouse, collaboration
    
Polycom
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Forrester has published the results of its research evaluating the 10 most significant web application firewall (WAF) vendors on 33 important criteria. Akamai is proud to be recognized as one of three Leaders in WAFs, with top rankings in both the current offering and strategy categories.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Genesys     Published Date: Jun 08, 2018
In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process
Tags : 
contact center, infrastructure, customer engagement, cloud, on-premises
    
Genesys
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
    
IBM
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.