compare

Results 301 - 325 of 541Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: May 13, 2015
The survey offers a big picture view of the investments in mobile by leading marketers—and what it will take to stay on top. Read on and find out where you stand.
Tags : investing in mobile marketing, mobile engagement strategies, mobile marketers, mobile investmentments
     Adobe
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme
     Worldpay
By: Cisco     Published Date: Apr 10, 2015
Compare Switches & Get Free Resources Our guides and free service can help you prepare for mobility, advanced security, and simplicity with the new Catalyst switches.
Tags : cisco, catalyst, networks, byod, mobile computing, wifi
     Cisco
By: IBM     Published Date: Apr 09, 2015
Like it or not, you will hear from your vocal users. It’s not unusual to see ratings from 1 to 5 stars for the same app. How do you track and compare actual and perceived quality? How can you get actionable insight from user feedback to develop mobile apps that engage users?
Tags : cloud-based services, actionable insight, user feedback, mobile apps, coding
     IBM
By: NetApp     Published Date: Apr 02, 2015
This paper explores several of the total cost of ownership (TCO) benefits associated with flash storage compared to those of traditional hard disk storage environments. Experiences of customers with NetApp® flash storage solutions demonstrate how deployment of flash storage can translate into a lower TCO than that provided by traditional hard disks.
Tags : netapp, flash, flash storage, tco, disk storage
     NetApp
By: IBM     Published Date: Mar 17, 2015
Download this comprehensive report as a guide to assess and compare vendor B2B commerce suite solution. Use this report as a foundation for planning your organization's e-commerce objectives.
Tags : ibm, e-commerce objectives, b2b commerce suites, b2b commerce vendors, b2b customer demand, b2b e-commerce
     IBM
By: IBM     Published Date: Mar 10, 2015
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.
Tags : software development, ibm, agile development, software delivery, it management
     IBM
By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
     LifeLock
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Read on to discover revealing points on the climate of phone systems in 2015
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid, mobility, data center
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Our new infographic, Step-by-Step Phone System Implementation, gives you an honest look into the successes and challenges at every stage of the phone systems implementation process
Tags : system implementation, communication structure, infographic, phone system, implementation process
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
The business phone system search can be a complex one… but there are some must-have features that will help you narrow down your search. Our new infographic details the features that really matter for most businesses.
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid, mobility
     CompareBusinessProducts
By: CompareBusinessProducts     Published Date: Feb 27, 2015
One sign that your phone system is getting obsolete is when your spare parts are available on order only, and it takes a week for the items to arrive. Our infographic unveils the other symptoms!
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid, mobility, deployment, buyers checklist, infrastructure
     CompareBusinessProducts
By: Cisco     Published Date: Feb 13, 2015
Cisco Catalyst 2960-X and -XR Series Switches earned the Miercom Certified Green Award for saving over 50% in annual energy operating costs compared to the industry average. The switches were evaluated in accordance with the Miercom Certified Green Testing Methodology. Test results show the benefits of Cisco Catalyst 2960-X and -XR Series Switches.
Tags : catalyst, lab testing, switch models, monitored, power consumption, power efficiency, environmental impact, energy costs
     Cisco
By: Cornerstone OnDemand     Published Date: Feb 12, 2015
Today’s executives don’t hold HR in very high esteem: according to Deloitte, “42 percent of business leaders believe their HR teams are underperforming or just getting by, compared to the 27 percent who rate HR as excellent or good when assessing HR and talent programs.” Learn how HR can become a strategic partner to the C-Suite..=
Tags : cornerstone ondemand, employee engagement, leadership, development strategy, employees, high performing, operational leadership, business success
     Cornerstone OnDemand
By: HP     Published Date: Feb 11, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
     HP
By: IBM     Published Date: Feb 11, 2015
In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.
Tags : data capture, network forensices, ibm, incident forensics, it security tools, security, it management, enterprise applications
     IBM
By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : cloud environment, iaas, paas, saas, access management, security, it management
     IBM
By: Brightcove     Published Date: Feb 04, 2015
Welcome to Content Marketing in Australia 2015: Benchmarks, Budgets, and Trends. This is the third year that Content Marketing Institute and the Association for Datadriven Marketing and Advertising (ADMA) have partnered to produce this report. This year, we look at how Australian for-profit marketers (both business-to-business and business-to-consumer) approach content marketing as compared with last year. Download the whitepaper to learn more!
Tags : australia, marketing, brightcove, benchmarks, budgets, trends, datadriven marketing and advertising, adma, for-profit marketers, content marketing institute
     Brightcove
By: HP     Published Date: Feb 02, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
     HP
By: HP     Published Date: Feb 02, 2015
HP Converged System 700 offers the opportunity for enterprise organizations to drastically increase their IT and user productivity at a significantly lower TCO compared with alternative infrastructure virtualization approaches. This ESG white paper presents a detailed economic analysis for HP Converged System 700, is designed to provide potential customers with a comprehensive picture of the potential direct and indirect cost and benefit drivers they should consider when evaluating a HP Converged System 700 investment.
Tags : 
     HP
By: Dell     Published Date: Feb 02, 2015
Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how the new Windows addresses today's workforce needs by enhancing mobile productivity, end-to-end security, and addresses virtualization and management advancements.
Tags : dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, compare
     Dell
By: Teradata     Published Date: Jan 30, 2015
This report is about two of those architectures: Apache™ Hadoop® YARN and Teradata® Aster® Seamless Network Analytical Processing (SNAP) Framework™. In the report, each architecture is described; the use of each in a business problem is illustrated; and the results are compared.
Tags : teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges, technology, aster, snap, framework, apache, hadoop, yarn, architectures, data management
     Teradata
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : endpoint performance, performance testing, security software, security
     Webroot Inc
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com