HIT Consultant Insightful coverage of healthcare innovation
 

it decision makers

Results 176 - 200 of 295Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : 
intralinks, data privacy, ovum, data security
    
Intralinks
Published By: Jamf     Published Date: Mar 13, 2018
The rise of Apple devices in a Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This white paper outlines how Apple AND Windows devices, tools, and infrastructure can happily integrate and coexist together.
Tags : 
    
Jamf
Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn about the challenges as you deploy hybrid clouds. The Forrester Report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.
Tags : 
hybrid clouds, network, data center, automation, network virtualization
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: KPMG     Published Date: Oct 04, 2019
For many enterprises, cloud migration is attractive for two key reasons: greater agility and lower cost. However, the jury is still out when it comes to the financial benefits. In this webinar, KPMG’s Adrian Bradley, Head of Technology Architecture, and Emma Bisset, Senior Manager, CIO Advisory at KPMG UK, explore the reasons why. Listen to this webinar now to find out: • What leading IT decision makers told KPMG about their experience of cloud costs • Why organisations are failing to realise economic value from their cloud investments • What key levers your organisation can use to extract significant cost savings from existing deployments.
Tags : 
    
KPMG
Published By: Lenovo and Intel     Published Date: Sep 10, 2019
In today’s rapidly changing security landscape, you simply can’t afford to let your guard down. Studies show that a staggering 4.5 billion records were compromised in the first half of 2018.The total cost of a single data breach is now $3.86 million. Meanwhile, the stealth of recent attacks has increased the time it takes to contain a breach—69 days, on average. To investigate how enterprises are responding to these proliferating threats, Lenovo commissioned a global survey of IT decision makers. The following research looks inside the volatile security landscape and shows us why keeping PCs secure today is harder than ever before.
Tags : 
    
Lenovo and Intel
Published By: LogMeIn     Published Date: Jul 13, 2012
This paper explores the challenges of supporting a remote workforce with legacy tools and the hidden costs of these tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to cut costs.
Tags : 
helpdesk, mobility, remote workforce, corporate firewall, legacy support tools, cost-saving
    
LogMeIn
Published By: LogMeIn     Published Date: Jul 17, 2012
Within today's competitive environment, where customers are more empowered than ever, organizations are looking to differentiate themselves from the competition and reduce customer churn through improvements in customer satisfaction. A recent Forrester survey found that 86 percent of decision makers rank their customers' experience as one of the top strategic priorities, and that 68 percent want to be customer service leaders in their industry. However, improving customer experience is no easy task. Companies must truly understand their customers, take into consideration the full spectrum of support they demand, as well as span the different channels their clients prefer for support.
Tags : 
logmein, white paper, technology, customer satisfaction, customer service, customer experience
    
LogMeIn
Published By: LogMeIn     Published Date: Mar 19, 2015
Within today’s competitive environment, where customers are more empowered than ever, organizations are looking to differentiate themselves from the competition and reduce customer churn through improvements in customer satisfaction. A recent Forrester survey found that 86% of decision-makers rank their customers’ experience as one of the top strategic priorities, and that 68% want to be customer service leaders in their industry.
Tags : 
customer experience, customer satisfaction, support desk, customer care, customer support
    
LogMeIn
Published By: LogMeIn     Published Date: Mar 19, 2015
Within today’s competitive environment, where customers are more empowered than ever, organizations are looking to differentiate themselves from the competition and reduce customer churn through improvements in customer satisfaction. A recent Forrester survey found that 86% of decision-makers rank their customers’ experience as one of the top strategic priorities, and that 68% want to be customer service leaders in their industry. How does today’s customer support organization manage to respond? The answer lies in building a better support desk that will let you do more with less without sacrificing on support quality or end-user satisfaction. Wondering where to start? You may want to read these five tips.
Tags : 
customer experience, customer satisfaction, customer service, customer support
    
LogMeIn
Published By: LogRhythm     Published Date: Apr 04, 2017
The third-annual Cyberthreat Defense Report pursues this same objective: to inform the IT security community not so much about what the bad guys are up to, but rather about how their peers globally are currently defending against threats and the changes they expect to make going forward. Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions.
Tags : 
    
LogRhythm
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: M86 Security     Published Date: Dec 01, 2010
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Published By: Mailtrust     Published Date: Jul 07, 2008
Email is absolutely critical in making users productive: for example, a February 2008 survey conducted by Osterman Research found that 93% of email users consider email to be important or critical in helping them to get their work done. However, most decision makers are not aware of the true cost of providing email functionality to their users.
Tags : 
messaging, email, e-mail, email costs, cost of email, cost of e-mail, mailtrust
    
Mailtrust
Published By: MapR Technologies     Published Date: Jan 03, 2014
As the demand for Big Data analytics mushrooms, IT decision-makers must prepare for the widespread deployment of Hadoop. This Technical Insight Paper from the Evaluator Group outlines the key requirements that must be met to make Hadoop enterprise data center ready.
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata, analytics, mapreduce, data, data center, mapr
    
MapR Technologies
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : 
endpoint, efficiency, security, prevention, technology, decision makers
    
McAfee EMEA
Published By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
microsoft, analytics, data, business impact
    
Microsoft
Published By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.