Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

report

Results 26 - 50 of 4283Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Pre-Crime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Pre-Crime Division, empowered to intervene before a violation is ever committed. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism
Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Brent Kendrick, Regional Director APAC, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
Published By: Procore     Published Date: May 13, 2019
As the construction industry becomes more competitive, regulations increase and skilled labour becomes more selective; the one thing that will define your company from the competition is your data. The best companies use real, situational data in pre-task analyses daily to report on and improve their Quality, Safety and Productivity processes and performance. Download your copy to learn: • The importance of including quality, safety and productivity in your pre-task analyses • Using the three-part task-analysis approach • How to collect meaningful data to track performance
Tags : 
    
Procore
Published By: Genesys     Published Date: Dec 20, 2018
Companies across the world are innovating with artificial intelligence (AI) to improve customer experience and forge deeper relationships with customers. Through surveys and interviews with 599 executives, from large and mid-sized companies across the globe, this MIT report reveals that most customer-centric firms have already deployed AI extensively in their customer-facing operations and customer experience management processes. Get the global report and regional spotlights on North America, Latin America, Europe and Asia to access complete results. Key insights include: • Nearly 90% of respondents report measurable improvements in the speed of complaint resolution; 80% note enhanced call volume processing using AI • 80% of respondents report measurable improvements in customer satisfaction, service delivery and contact center performance • In North America, 60% of the respondents believe they will deliver a 10% or more increase in customer lifetime value in the next year • Europe
Tags : 
    
Genesys
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, change management, server virtualization, application integration, business intelligence
    
ASG Software Solutions
Published By: Sitecore     Published Date: Nov 04, 2009
This report highlights the strategic value of a next generation web content management system integrated with lead scoring, email marketing, customer relationship management, and web analytics. The report links the technology and practices of Best-in-Class organizations to engage customers, provide personalized experiences and manage the lead lifecycle.
Tags : 
sitecore, aberdeen, lifecycle management, web content management, analytics, crm, emarketing, email marketing, lead generation
    
Sitecore
Published By: Virtuant Corp.     Published Date: Oct 29, 2011
A benchmark report to provide IT decision makers with a fair comparison of two of the most popular application server products on the market today.
Tags : 
    
Virtuant Corp.
Published By: Lepide     Published Date: Jan 16, 2013
This white paper article is a compendium encompassing the key features of The Lepide Active Directory Management & Reporting (LADMR)
Tags : 
    
Lepide
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The future of business process management lies in Robotic Process Automation. This report covers the benefits of the technology and other business process optimization approaches that Best-in-Class organizations take to improve efficiency.
Tags : 
    
Group M_IBM Q2'19
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data, conversion, marketing roi, direct mail campaign, multi channel marketing, integrated marketing campaign, lead generation, campaign management, tracking and measurement, reports and analytics, marketing dashboard
    
Mindfire
Published By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : 
napco, target marketing, customer segmentation
    
TargetMarketing
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP
Published By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation – both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Dell APAC     Published Date: May 16, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: HPE APAC     Published Date: Jun 16, 2017
In this report, we’ll look at some of the challenges that smaller organisations face in building and managing IT, along with how some businesses are leveraging a hybrid cloud and on-premise approach, gaining some significant benefits through this approach.
Tags : 
    
HPE APAC
Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search