eva

Results 1 - 25 of 2231Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
    
SAP
Published By: Box     Published Date: Jun 22, 2018
• Enterprise Content Management is a market in transition. And as demand for modernization becomes widespread, long-time leaders are investing in new capabilities to keep up — and bringing more of the market to the cloud to meet the needs of users and IT managers alike. • • This report shows how a range of providers measure up to help companies make the right choice when • requirements are skewed to the needs of information workers who need to create, collaborate on, share, and find enterprise content. • • Use the 2017 Forrester Wave™ report to: o Get educated. Gain an understanding of how the ECM market is changing and why complex, on-premises ECM suites are giving way to Cloud Content Management platforms like Box. o Define your needs. Forrester ranks the top 15 ECM business content vendors based on current offerings, strategy and market presence to help you evaluate vendors that suit your needs. o Select a vendor. Learn how cloud content management platforms like Box are designed
Tags : 
    
Box
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Dell PC Lifecycle     Published Date: May 22, 2018
Los patrones de compra de ordenadores personales para empresas están cambiando, pues los compradores buscan mejorar la seguridad y la experiencia de los empleados al mismo tiempo. Con el aumento global en la movilidad de los empleados y la tendencia de las empresas a dirigir sus inversiones hacia las tabletas y los ordenadores portátiles, las organizaciones están evaluando su inversión constante en los ordenadores de sobremesa . Queda claro que los compradores de ordenadores personales para empresas siguen valorando la seguridad y el rendimiento que ofrecen los equipos de sobremesa. También dicen que los nuevos formatos de sobremesa, como el formato Micro , les permiten ofrecer una mejor experiencia para los empleados, lo que para ellos es casi tan importante como la seguridad. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software APAC
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
    
CA Technologies_Business_Automation
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Zendesk GmbH     Published Date: Apr 25, 2018
Zendesk commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that organizations may realize by utilizing Zendesk’s customer support products to improve handling customer interactions. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Zendesk on their organizations. To better understand the benefits, costs, and risks associated with a Zendesk implementation, Forrester interviewed seven organizations with experience using Zendesk’s customer support products.
Tags : 
    
Zendesk GmbH
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Boardwalktech     Published Date: Jun 05, 2018
Blockchain is reimagining the way enterprises operate. It’s a powerful new enterprise technology that can be used across vertical and application domains to realize greater efficiency, support new business models and revenue sources, and enhance the security and elevate the trust of enterprise transactions.
Tags : 
    
Boardwalktech
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Vonage Business     Published Date: Jul 31, 2018
This white paper looks at how UCaaS is evolving and provides guidance on what buyers should look for while evaluating modern UCaaS solutions.
Tags : 
    
Vonage Business
Published By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : 
itil, implementation, digital
    
Cherwell Software
Published By: Genesys     Published Date: Jun 13, 2018
When building artificial intelligence (AI) into your business strategy, it’s easy to become distracted by all the new technologies on the market—each one promising a better customer experience. Make decisions based on facts, not misconceptions. When you evaluate AI technologies, consider these facts: • Bots working with human agents enables a seamless customer journey • Automated self-service costs as little as 20 cents per interaction • A single platform makes it easier to deliver personalized, proactive and predictive experiences See how AI connects customer conversations in this new analyst guide, 2017 ContactBabel Inner Circle Guide to Self-Services.
Tags : 
artificial intelligence, customer experience, customer journey, self-servic e, personalization
    
Genesys
Published By: Genesys     Published Date: Jun 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process
Tags : 
leadership, customer engagement, decision making
    
Genesys
Published By: Workday Italy     Published Date: Aug 15, 2018
HCM suites enable core HR, payroll, talent, workforce management and HR service delivery processes. Application leaders in entities with over 1,000 workers and emerging global needs that are pursuing a cloud HCM strategy should use this research to help identify vendors for further evaluation.
Tags : 
    
Workday Italy
Published By: Workday Italy     Published Date: Aug 15, 2018
In our 35-criteria evaluation of software-as-a-service (SaaS) HR management systems providers, we identified the eight most significant ones — ADP, Ceridian, Meta4, Oracle, Ramco Systems, SAP SuccessFactors, Ultimate Software, and Workday — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals and their HR business stakeholder clients make the right choice.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Aug 07, 2018
HCM suites enable core HR, payroll, talent, workforce management and HR service delivery processes. Application leaders in entities with over 1,000 workers and emerging global needs that are pursuing a cloud HCM strategy should use this research to help identify vendors for further evaluation.
Tags : 
    
Workday Spain
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.