HIT Consultant Insightful coverage of healthcare innovation
 

criteria

Results 326 - 350 of 379Sort Results By: Published Date | Title | Company Name
Published By: Teradata     Published Date: Sep 21, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their RTIM needs.
Tags : 
application management, business analytics, business process management (bpm), cloud applications, desktop management, experian, forrester, integrated cloud solution
    
Teradata
Published By: Pega     Published Date: Sep 11, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their RTIM needs.
Tags : 
    
Pega
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: OpenText     Published Date: Jun 28, 2019
According to Forrester, vendors that can make integration easier as well as provide a broad set of integration scenarios position themselves to successfully deliver in any public, private, hybrid and/or multi-cloud environment. Download the Forrester™ Wave report, Strategic iPaaS and Hybrid Integration Platforms, Q1, 2019, to discover the 15 integration solution providers that are most significant based on Forrester’s 25 criteria.
Tags : 
    
OpenText
Published By: Aria Systems     Published Date: May 03, 2016
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
    
Aria Systems
Published By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
Published By: Cisco     Published Date: May 15, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco
    
Cisco
Published By: Polycom     Published Date: Dec 18, 2014
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
forrester, vmr, cloud-computing, scalability, interoperability
    
Polycom
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: MCH     Published Date: Jan 29, 2007
Learn how local governments operate, who makes the purchasing decisions, what criteria influence buying decisions, and how timing can play a critical role in the success of your marketing campaigns.
Tags : 
government, local government, mch, mailings.com, database and list managers
    
MCH
Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
Why Ease of Use and Quality of User Experience Are The Most Critical Criteria for Successful Videoconferencing Deployments.
Tags : 
lifesize, videoconferencing deployment, ip-network, user experience, telecommunication
    
LifeSize, a division of Logitech
Published By: Incapsula     Published Date: Jul 11, 2014
Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.
Tags : 
ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites
    
Incapsula
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec
    
Aventail
Published By: Oracle Corp.     Published Date: Sep 10, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e- commerce platform-which should be the last e-commerce platform you ever need to buy.
Tags : 
oracle, e-commerce, technical considerations, platforms
    
Oracle Corp.
Published By: Oracle     Published Date: Feb 03, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e- commerce platform-which should be the last e-commerce platform you ever need to buy.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Published By: Oracle     Published Date: Sep 11, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e-commerce platform--which should be the last e-commerce platform you ever need to buy.
Tags : 
e-commerce platforms, it marketing, e-commerce applications
    
Oracle
Published By: Spectrum Enterprise     Published Date: May 28, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: Delphix     Published Date: Mar 24, 2015
Data virtualization is becoming more important as industry-leading companies learn that it delivers accelerated IT projects at reduced cost. With such a dynamic space, one must make sure that vendors will deliver on their promises. This white paper outlines the top 10 qualification questions to ask before and during the proof of concept.
Tags : 
    
Delphix
Published By: IBM     Published Date: Aug 09, 2018
How cloud and managed services help IT deliver business value services.
Tags : 
    
IBM
Published By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : 
juniper, firewall, traffic
    
Juniper Networks
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.