key findings

Results 76 - 100 of 128Sort Results By: Published Date | Title | Company Name
By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : web threats, data loss, security, web gateway, web attacks, security breach
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
     Webroot
By: IBM     Published Date: Jun 17, 2014
Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.
Tags : ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics, cultural alignment
     IBM
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: SAS     Published Date: Jun 06, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
     SAS
By: Lenovo and Intel®     Published Date: Jan 19, 2017
Accessing, analyzing, and actioning with big data are among the key challenges facing every enterprise. In this detailed report from Forrester, you’ll see key drivers and challenges with Big Data, AND some clear recommendations on how to proceed. Get the white paper to see Forrester's key findings.
Tags : lenovo, data access, big data, data analysis
     Lenovo and Intel®
By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : tripwire, legacy log management, data security, compliance automation solutions, it security, cso
     Tripwire
By: IBM     Published Date: May 08, 2018
Our recent Ponemon Institute report reveals key findings from organizations' ability to protect their mobile and IoT apps.
Tags : iot application security, iot apps, security
     IBM
By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : mobile apps, it statistics, mobile trend statistics, mobile app backlog, it management, enterprise applications
     OutSystems
By: Cisco     Published Date: Dec 21, 2016
What are the key elements of a collaboration framework that can help IT decision makers (ITDMs) and business decision makers (BDMs) come to a mutual understanding of how, where and why to use videoenabled collaboration solutions, in particular, F2F video? To answer this question, Techaisle conducted a survey of 1,269 ITDMs and BDMs with SMBs and midmarket businesses, across the US, Latin America, Europe, and Asia Pacific. The survey was commissioned by Cisco. The survey findings provide guidance to SMBs and midmarket decision makers on how the nature of the collaboration discussion is changing, drive acceptance and use of F2F video throughout their organization to maximize business payback, and align objectives with the outcomes that shape the activities of highgrowth innovative firms who are the most successful users of advanced collaboration technology.
Tags : 
     Cisco
By: SurveyMonkey     Published Date: Aug 25, 2015
SurveyMonkey Audience fielded a Brand Pulse study to better understand consumer buying behaviors for the L’Oréal brand and other key players within the shampoo market.
Tags : brand management, data insights, surveymonkey, consumer behaviors, key findings, best practices, purchase decisions, crm, data management
     SurveyMonkey
By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics, data center
     IBM
By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Cornerstone and HCMG have benchmarked the last five years of progress in human capital management for government. Let's take a look at the key findings from this year’s study.
Tags : capital, management, government, cornerstone
     Cornerstone OnDemand
By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, enterprise applications
     Riverbed
By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec Positioned as a Leader in Independent Research Firm Report Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave™: Endpoint Security, Q1 2013 and “remains a good choice” in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec Endpoint Protection 12 positioned as a Leader in 2013 Gartner’s Magic Quadrant Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner’s Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
PassMark Software conducted objective performance testing on six Enterprise Endpoint Security products. Benchmarking was performed using sixteen performance metrics to assess product performance and system impact on the endpoint or client machine. Download the report to find out results from these performance tests. Download Now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 12, 2013
Symantec has been positioned as a Leader in Gartner Magic Quadrant for Secure Email Gateways. Gartner is the world's leading information technology research and advisory company. Vendors in the Magic Quadrant are evaluated based on ability to execute and completeness of vision. Read Gartner's Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Damballa     Published Date: Oct 24, 2014
Damballa’s Q3 State of Infections report discusses the state of continuous breach that enterprises face today. Key findings include: * Malware dwell time equates to loss * How to minimize risk of a POS malware breach * Where the security gaps are and how to close them
Tags : damballa, state of infection, enterprise, attacks, reduce risk, infection rate, security
     Damballa
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com