research findings

Results 76 - 100 of 116Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: LogMeIn     Published Date: Sep 04, 2013
This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers.
Tags : 
support services, logmein, rescue, hdi research corner, service experience, technical support, satisfaction, organizational satisfaction
    
LogMeIn
Published By: Oracle     Published Date: Apr 22, 2014
A 2013 global research findings report on what service managers need to know to drive the cloud.
Tags : 
cloud, cloud applications, service managers, oracle
    
Oracle
Published By: Acxiom Corporation     Published Date: Jun 20, 2014
Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.
Tags : 
acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy
    
Acxiom Corporation
Published By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
forrester, enterprise, data, technology, best practices, innovation, security
    
SnowFlake
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost, ownership
    
WinMagic Inc.
Published By: IBM     Published Date: Oct 24, 2013
This analyst research paper contains findings from Aberdeen Group on the financial reporting pressures, challenges faced by organizations particularly with regulatory mandates
Tags : 
ibm, aberdeen group, financial reporting pressures, financial challenges, analyst insight, disclosure management, organizational transparency, organizational collaboration, deman for data, utilize the data, business intelligence, real-time data initiatives, real-time financial reporting
    
IBM
Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots
    
Incapsula
Published By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : 
tripwire, legacy log management, data security, compliance automation solutions, it security, cso
    
Tripwire
Published By: SyberWorks     Published Date: Oct 21, 2008
The e-Learning industry has grown tremendously since the early days of computers and the Internet. Today there are lots of products and services out in the market place from which to choose. This white paper will provide some basic information to help you as you begin your research into e-Learning and learning management systems. The document is not meant to be the complete source of information on e-Learning nor will these guidelines be suitable for every single situation. This white paper has been created as a learning aid help you get started. These findings represent the research, experience, and techniques gleaned from working in e-Learning since its infancy in the late 80’s to today. At the end of the paper, Bob Goldschneider, Director of Business Development at SyberWorks, Inc., will provide a summary and closing remarks.
Tags : 
syberworks, e-learning, internet, aicc, scorm, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: IBM     Published Date: Feb 05, 2015
This new research — based on data collected in May 2013 from 29 organizations using visual data discovery and 95 that were not — reinforces those findings. In addition, Aberdeen's research demonstrates that visual data discovery can help to usher in a different approach to analytics, an approach that is far more user driven.
Tags : 
advanced analytics, visual data discovery, managed reporting, data discovery tools
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability
    
Vision Solutions
Published By: Cornerstone OnDemand     Published Date: Feb 07, 2017
collaboration between Cornerstone OnDemand and researchers at Harvard Business School uncovers how the distance between two employees’ desks affects various performance measures. According to the findings, placing the right type of workers in close proximity to each other has been shown to generate up to a 15% increase in organizational performance. For an organization of 2,000 workers, strategic seating planning could add an estimated $1 million per annum to profit.
Tags : 
    
Cornerstone OnDemand
Published By: Zycus     Published Date: May 29, 2010
Spend Matters research has long considered Hackett Group metrics to be the gold standard of P2P benchmarking. As part of the collaboration for the research for this report, Hackett agreed to share with Spend Matters some of the findings from its latest P2P benchmarks.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement, strategic procurement
    
Zycus
Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise
    
Blackberry
Published By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : 
mobile apps, it statistics, mobile trend statistics, mobile app backlog
    
OutSystems
Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: Cisco     Published Date: Jan 05, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Dec 18, 2014
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
forrester, vmr, cloud-computing, scalability, interoperability
    
Polycom
Published By: Polycom     Published Date: Dec 18, 2014
In December 2012, Wainhouse Research (WR) and Polycom jointly created and fielded a WR-branded survey focused on the benefits that organizations realize via the use of video conferencing. Invitations to participate in the survey were released in numerous ways including: - Via email invites to a list of Polycom end-user contacts - Via email invites to a list of WR end-user contacts - Via clickable banners on numerous websites This document provides a top-level view of the survey data, along with some additional findings and observations.
Tags : 
tablets, polycom, video benefits
    
Polycom
Published By: CrowdTwist     Published Date: Aug 04, 2017
Millennials have officially surpassed the Baby Boomers as the nation’s largest living generation and newcomers Generation Z are rising in the ranks, poised for consumer domination with $44 billion in spending power. It’s expected that Generation Z will make up 40 percent of consumers by 2020. Never has understanding these two generations been as critical for brands in their pursuit of establishing consumer loyalty. CrowdTwist conducted research into the similarities and differences between Generation Z and Millennials, how they engage with brands, their shopping habits, their brand loyalty and their attitudes towards loyalty programs. This report provides an overview of those findings as well as recommendations for brands investing in loyalty strategies for current and future consumers.
Tags : 
gen z, millennials, crowdtwist, branding, loyalty, consumers
    
CrowdTwist
Start   Previous    1 2 3 4 5    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.