consulting

Results 101 - 125 of 450Sort Results By: Published Date | Title | Company Name
By: BMC Software     Published Date: Jul 22, 2015
In this study conducted by Forrester Consulting and commissioned by BMC, you’ll find out why 93% of US and UK IT decision-makers surveyed consider capacity management important or very important to their cloud strategy. Learn how using capacity management to manage workloads in the cloud can help Increase flexibility and continuity for your organization.
Tags : cloud, capacity management, cloud strategy, workload, continuity
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
In this on-demand webinar, you will hear about the results of a Forrester Consulting study with 432 IT practitioners that shows why capacity management is essential to your cloud transformation strategy and provides guidance on how you can get started.
Tags : capacity management, cloud, cloud strategy, cloud workload
     BMC Software
By: CA Technologies     Published Date: Nov 02, 2016
In today’s competitive world, agile methodologies promise faster delivery, higher quality, increased productivity and better alignment with your company strategy. But while many companies introduce agile approaches at the team level, they often fail when scaling agile to the program and portfolio level. CA Agile Ready > Sync > Go provides a complete solution for building and launching successful, enterprise-scale agile programs. Integrating the industry leading expertise of CA Agile Transformation Consulting with the CA Agile Central enterprise-class planning and tracking platform, Ready > Sync > Go can help you build and launch a high-performing agile program in as little as three months.
Tags : 
     CA Technologies
By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : microsoft, analytics, data, business impact
     Microsoft
By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
     Microsoft
By: Juniper Networks     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     Juniper Networks
By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
     Google
By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
     CA Technologies EMEA
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
     CA Technologies_Business_Automation
By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
     Intapp
By: Intapp     Published Date: May 10, 2019
The Cornerstone of Financial Control Time equals money. Time plus data equals control. All professionals, whether in management, consulting, engineering, or accounting, must be confident that their value is reflected in their bottom line. One of the primary factors driving that compensation is the amount of time spent on a particular subject or client. But too often front line earners at those firms don’t provide the clean, data-rich timesheets needed to accurately gauge the effort required by each project.
Tags : business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
     Intapp
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Google     Published Date: Oct 26, 2018
In this Forrester Consulting report commissioned by Google, it explores cloud development approaches, preferences, challenges, and benefits among development and IT leaders at global enterprises. Among the key findings, it was clear that cloud is on its way to becoming synonymous with modern and innovative when it comes to applications. It also shows that application developers seek more agile tools with containers and functions that enable greater flexibility. Read the report to find out more.
Tags : 
     Google
By: Riverbed     Published Date: May 24, 2012
Forrester Consulting recently analyzed the requirements for consolidating branch office infrastructures while simultaneously supporting the demands of emerging business goals.
Tags : infrastructure, server and storage virtualization, wan optimization, dns, dhcp, branch-office, data center
     Riverbed
By: JBoss Developer     Published Date: Oct 21, 2016
TMG Health, the largest business process outsourcing (BPO) provider in the Medicare and Medicaid market, relied on a slow, batch-oriented legacy application environment that prevented it from providing continuous data visibility and access to its clients. With help from Red Hat Consulting, TMG deployed a new application platform using Red Hat JBoss Enterprise Application Platform and other Red Hat solutions. As a result, TMG reduced development time and costs and delivered real-time data access and visibility to its clients.
Tags : consulting, efficiency, data, api, java
     JBoss Developer
By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
     MarkLogic
By: Longi Engineering     Published Date: Jan 23, 2018
Longi Engineering, a leading Microsoft SharePoint partner, was engaged to assist a leading Performing Arts Center in implementing an organizational SharePoint intranet to allow them to increase employee collaboration, automate previously manual processes and collaborate more effectively. The organization faced numerous challenges such as document management, legal contract workflow, records retention and labor intensive/error prone manual processes.
Tags : software development, it consulting services, net software solutions, microsoft sharepoint
     Longi Engineering
By: Longi Engineering     Published Date: Jan 23, 2018
Longi Engineering was engaged to assist a Community Action non-profit in implementing SharePoint to fulfill several organizational requirements they had as well as resolve multiple challenges they faced. Manual paper processes were hindering the organization from being able to efficiently focus on their goal of providing services and strengthening the community to improve the quality of life for residents in their County.
Tags : software development, it consulting services, net software solutions, microsoft sharepoint
     Longi Engineering
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com