• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

vendor

Results 251 - 275 of 1504Sort Results By: Published Date | Title | Company Name
By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
By: Google     Published Date: Oct 26, 2018
This Forrester research looks at how 7 full-stack public cloud development platform providers perform against a 31-criteria evaluation. The most important vendors — Alibaba, AWS, CenturyLink, Google, IBM, Microsoft, and Oracle — were researched, assessed, and scored. Download the complete report and find out how each provider measures up and helps application development and delivery professionals make the right choices.
Tags : 
    
Google
By: ipoque     Published Date: Oct 04, 2018
The SD-WAN market is growing fast, but so is competition. In such a competitive environment, SD-WAN vendors need to offer products with unique features and capabilities in order to stand out. Real-time application visibility powered by deep packet inspection (DPI) software can be the decisive element in achieving them. This whitepaper highlights the key value of DPI software, which is enabling advanced SD-WAN analytics and security features.
Tags : 
dpi, deep packet inspection, sd-wan, analytics, network analytics, traffic analytics
    
ipoque
By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
    
CA Technologies
By: IBM UK&Ireland     Published Date: Nov 14, 2017
In Forrester’s 40-criteria evaluation of omnichannel order management (OMS) vendors, we identified the nine most significant software providers in the category — Aptos, IBM, Jagged Peak, Kibo, Manhattan Associates, NetSuite, Oracle, Radial, and SAP Hybris — and researched, analyzed, and scored each. This report details our findings about how well each vendor fulfills our criteria and where each stands in relation to one another to help eBusiness professionals select the right partner for their omnichannel order management needs.
Tags : 
omni channel, ibm, order management, forrester, partner, optimization
    
IBM UK&Ireland
By: IBM UK&Ireland     Published Date: Nov 14, 2017
Our inclusion criteria for this Magic Quadrant emphasize the financial wherewithal of the digital commerce vendors as well as the robustness of their digital commerce platforms, most of which enable large volumes of buying transactions and significant levels of digital commerce GMV revenue. Many platforms support the needs of multiple industries and multiple regions, if not offer global support.
Tags : 
magic quadrant, digital, commerce, gmv, vendors, ibm
    
IBM UK&Ireland
By: Kaminario     Published Date: Aug 16, 2016
With plenty of All flash solutions to choose from it can be really tough to get to the bottom of exactly what vendors are selling. And that might result in you missing out on key capabilities that will transform data center performance. Simply download our new eBook ‘Six uncomfortable questions to ask your All flash vendor’. It’s the easiest way to get back in control of your purchasing decisions.
Tags : 
kaminario, kaminario storage, enterprise storage, all-flash, all-flash array, all-flash arrays, flash storage, all flash, all flash array, all flash arrays, enterprise applications, storage
    
Kaminario
By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : 
kaminario, flash, performance, storage, application performance, scalability, networking, security, enterprise applications
    
Kaminario
By: Workday UK     Published Date: Jan 31, 2019
Looking to start the evaluation process for a new technology provider? This complete guide for medium-sized organisations walks you through how to prepare for your evaluation and what your company should look for in a vendor, so you can be confident in your search and selection. Read the guide now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
By: IBM     Published Date: Jul 07, 2015
This Technical Support Services infographic explains how IBM can help you manage your multivendor IT environment.
Tags : 
multivendor, it environment, performance, software activities, virtualization, operating systems, it management
    
IBM
By: IBM     Published Date: Jul 07, 2015
IBM Integrated Multivendor Support provides lifecycle-based recommendations concerning what hardware should be kept on OEM maintenance, moved to IBM maintenance or replaced. We help you streamline multivendor support by serving as a single point of contact and accountability.
Tags : 
multivendor, it environment, performance, software activities, virtualization, operating systems, networking, it management
    
IBM
By: IBM     Published Date: Apr 14, 2016
Ovum has produced this Ovum Decision Matrix to identify how the leading customer analytics vendors stack up against each other in terms of their technology, execution of strategy, and market impact.
Tags : 
ibm, ovum, ovum decision matrix, customer analytics solution, telcos, telecom
    
IBM
By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Forrester evaluated the strengths and weaknesses of top Mobile Development vendors. Get the report to learn why Oracle makes an impact and is growing in deployment options and analytics.
Tags : 
    
Oracle PaaS/IaaS/Hardware
By: Patsnap     Published Date: Jul 25, 2016
IP data can be used to assess new markets - analysing the vendor landscape and providing insights into future innovation. Using the drones market as an example, we did just that.
Tags : 
drones, drone, drone technology, unmanned aerial vehicles, commercial drones, business intelligence, project management, design engineering
    
Patsnap
By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
By: Workday     Published Date: Feb 04, 2019
Looking to start the evaluation process for a new technology provider? This complete guide for medium-sized organisations walks you through how to prepare for your evaluation and what your company should look for in a vendor, so you can be confident in your search and selection. Read the guide now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : 
industry 4.0, iiot, smart machines, smart manufacturing, business models
    
Schneider Electric
By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : 
success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central, strategic agility, user adoption, improved security, time to value, on-premise vs. cloud, evaluating software investments, security management, business management, data integration, service management
    
Success Factors
By: Success Factors     Published Date: Aug 02, 2012
This free Ventana Research report shows SuccessFactors to be a top supplier of applications that support the management and operations of compensation. According to Ventana, SuccessFactors Compensation (part of SuccessFactors BizX Suite) achieved the top overall ranking due to its scores in Reliability and Capabilities. In addition, the growing number of SuccessFactors customers and the company's commitment to cloud computing contributed to its top ranking in the Validation and TCO/ROI categories. Easy for managers at all levels to use, the application has capabilities for compensation reviews and adjustments, as well as an embedded analytic view-which shows the handling of promotions and support across pay ranges. Find out what else Ventana has to say about SuccessFactors in this complimentary report. Download it today.
Tags : 
successfactors, sap, ventana research, value index, total compensation management, benchmark research, human capital, vendors, value index, total cost operations, return on investment, roi, tco, usability, manageability, reliability, capability, adaptability, validation, successfactors
    
Success Factors
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter