HIT Consultant Insightful coverage of healthcare innovation
 

analyst report

Results 126 - 150 of 165Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 06, 2016
This analyst report shows the effectiveness of a pre-hire assessment.
Tags : 
ibm, hiring, human resources, pre-hire, employee retention, performance
    
IBM
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: Dell EMC     Published Date: Aug 06, 2018
Download this whitepaper for 4 reasons shorter server resfresh cycles are better for business. Analyst firm IDC reports that organizations can increase agility, improve efficiency and reduce operational costs by refreshing their servers every three years.
Tags : 
    
Dell EMC
Published By: Opalis     Published Date: Nov 06, 2006
Automating repetitive Data Center Operations into best practices makes response times faster, more reliable, and less costly. Learn how to extend your current IT systems to do more of the routine work, freeing up IT staff for higher-value projects.
Tags : 
process automation, automation, business process automation, bpa, data centers, datacenter, datacenters, response time
    
Opalis
Published By: Amazon Web Services     Published Date: Apr 16, 2018
SAP and Amazon Web Services (AWS) have jointly developed a cloud-migration test program, Fast Amazon SAP Transformation (FAST), that helps you address time- and cost-related uncertainties when migrating HANA to the AWS cloud. This analyst report from Ovum explores how FAST (a four-step testing process) drastically reduces uncertainties about the time and costs involved in your HANA cloud migration. Download the report now and you’ll discover how FAST can help you: -Quickly quantify costs, risks, and time for migrating SAP ERP applications to the AWS Cloud. -Run your mission-critical applications faster and more reliably Migrate your SAP HANA database to the cloud in only a few days with minimal infrastructure cost Read the Report
Tags : 
    
Amazon Web Services
Published By: Gleanster Research     Published Date: Dec 11, 2012
Have you ever wondered if your organization is getting the most out of CRM? This 30 page analyst report from Gleanster Research explores best practices for augmenting CRM to optimize sales success.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion
    
IBM
Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: LogRhythm     Published Date: Jan 24, 2013
A SANS functional product review of LogRhythm version 6.1, conducted by senior SANS Analyst Dave Shackleford. It shows LogRhythm's SIEM toolset capable of analyzing and reporting on security data in many differed ways with easy-to-use features.
Tags : 
security intelligence, review of log rhythm, big data security, analytics platform, sans, logrhythm, siem toolset
    
LogRhythm
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
Read this analyst report from Frost & Sullivan to learn more about the changing SIEM market and AlienVault's SMB-focused approach to SIEM.
Tags : 
    
AlienVault
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
The need for social media intelligence (SMI) has increased during recent years as social media adoption rates and the number of social media sites that b-to-b organizations must track have grown. Organizations require reliable SMI tools to discover, monitor and make sense of social signals being sent by buyers, customers, influencers and even competitors.
Tags : 
social, sirius decisions, smi, b2b, b-to-b, smi, influencers, marketing strategy
    
Oracle Social Cloud
Published By: IBM     Published Date: Jul 30, 2014
Read this analyst white paper to identify key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Tags : 
ibm, business analytics, finance, automation, record to report, rtr, rtr process, disclosure management
    
IBM
Published By: Dell EMC     Published Date: May 15, 2015
Swiss analyst, Storage Switzerland, reports on the importance of customers assessing the right fit for a data center and workloads, specifically when evaluating an all-flash array solution.
Tags : 
emc, storage switzerland, all-flash, architectures, workload, data center, scale, storage
    
Dell EMC
Published By: NetApp     Published Date: Mar 05, 2018
Download the IDC Analyst Connection report to learn how to address your challenges around: infrastructure costs, data placement, and data analytics.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary Ombud analyst report which examines best practices for leveraging DocuSign’s Digital Transaction Management solution for CIA compliance and the impact such technologies are already having on forward-thinking Fortune 500 companies.
Tags : 
    
DocuSign
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere
Published By: IBM     Published Date: Jul 09, 2014
Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to see why enterprises are turning to managed services to help overcome these challenges so that they can optimize the value of their IT investments and achieve their corporate objectives.
Tags : 
ibm, managed services, it investments, data center, it infrastructure, managed services provider
    
IBM
Published By: Cisco     Published Date: Jan 05, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Okta APAC     Published Date: Dec 19, 2018
Okta was recognized as a strong performer in Zero Trust Security. Analyst firm Forrester Research has named Okta a Strong Performer in its report, The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018. The research ranks Okta with the highest possible score in the evaluation criteria “people/workforce security,” “ZTX vision and strategy” and “market approach.” According to Forrester, “Zero Trust is going mainstream. The entire security industry is talking about Zero Trust, and numerous vendors have embraced it and now use it to market and position their capabilities as well as guide their future road maps; the time to formalize the evaluation criteria for vendors in this space is now. The Forrester Wave helps security professionals identify which vendors have internalized and most closely align to Forrester’s Zero Trust eXtended (ZTE) framework. This evaluation also shows how each vendor’s portfolio maps and delivers on specific components of the ZTX framework
Tags : 
    
Okta APAC
Published By: Five9     Published Date: Aug 16, 2013
Six out of ten contact centers projected to have a cloud-based contact center deployed by the end of 2013. Why? Ultimately, because it will help them be more responsive to their customers, without the prohibitive costs of carrying enough premise-based technology to cover demand spikes. In this concise analysis of two recent contact center executive surveys, Aberdeen Group analysts discuss how cloud-based infrastructure enables contact centers to excel in key activities including center activity reporting, agent performance feedback and more.
Tags : 
cloud, roi, contact center, crm, solution, technology, premise-based
    
Five9
Published By: Stripe     Published Date: Jun 11, 2019
Analyst firm 451 Research interviewed 500 businesses and 1,000 consumers and found that Europe's online economy risks losing €57 billion when Strong Customer Authentication (SCA) goes into effect on 14 September. SCA is intended to reduce fraud rates and enhance the overall security of online payments. But what does this mean for businesses and how can they best accommodate these new requirements in order to limit the financial impact? Download the report to find out.
Tags : 
sca, online economy, online payment
    
Stripe
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.