reports

Results 301 - 323 of 323Sort Results By: Published Date | Title | Company Name
By: Matillion     Published Date: May 12, 2011
This whitepaper explains the importance of Business Intelligence to midsize companies, examines the challenges found in BI projects and explains how to be successful in improving visibility in your business.
Tags : business intelligence, management information, dashboard, dashboards, analysis, analytics, data warehouse, reports, reporting, cloud, saas, software as a service, matillion
     Matillion
By: Adobe     Published Date: Aug 22, 2013
With the exponential growth of smartphone and tablet use for search, research, and online purchases, mobile is quickly becoming the focal point of digital marketing. For most marketers, these increasingly ubiquitous devices are transforming the way customers engage with companies and their brands. Recent Adobe Digital Index reports have confirmed that smartphone and tablet traffic is rapidly on the rise, making these channels that advertisers need to be paying attention to as mobility trends continue to evolve.
Tags : search, search marketing, mobile marketing, mobile marketing trends, mobility trends
     Adobe
By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
     CDW Symantec
By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youíre doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youíre doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: Symantec     Published Date: Oct 07, 2014
Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartnerís Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned. * 10 reports published since 2002; previous titles include the Magic Quadrant for Enterprise Antivirus.
Tags : endpoint protection, growth drivers, challenges, vendor position, antivirus, magic quadrant, security
     Symantec
By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, youíll get insights on the current state of security threats and solutions. Find out why Gartner says, ďThe secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
     Cisco
By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europeóa subset of the data used in our global hotline report.
Tags : 
     NAVEX Global
By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. Youíll see how easy it can be to protect and defend against todayís threats with all of the essential security tools you need. Experience how USM makes it easy to: ē Discover all IP-enabled assets on your network ē Identify vulnerabilities like unpatched software or insecure configurations ē Detect malware like botnets, trojans & rootkits ē Speed incident response with remediation guidance for every alert ē Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
     AlienVault
By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesnít even get to your customerís inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers whoíve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
     eDataSource
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in todayís world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : venafi, ssh keys, vpn credentials, digital certificates
     Venafi
By: Polycom     Published Date: Feb 16, 2017
"When youíre evaluating video conferencing vendors, the IDC industry analyst reports provide key insight to help you determine which provider is right for your organization. In 2016, Polycom was named a leader in the IDC MarketScape: Worldwide Enterprise Videoconferencing Equipment 2016 Vendor Assessment. Download the reports to: Understand what is happening in the video conferencing market Learn what you should look for in a video conferencing vendor, and the current abilities of each player in the market See why IDC name Polycom a leader Discover when you should consider Polycomís video portfolio."
Tags : polycom, business technology, idc marketplace, enterprise video conferencing
     Polycom
By: Uberflip     Published Date: Jun 30, 2017
In this eBook, you will learn how implementing the right processes and tools to gather analytics, implement scoring, prove ROI, and create comprehensive reports on your content marketing efforts will provide the insight you need to make data-driven decisions. In turn, these decisions wonít just improve your content marketing performance, but will also allow you to meet your overarching business objectives.
Tags : 
     Uberflip
By: AWS     Published Date: May 18, 2018
Weíve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterdayís sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
     AWS
By: IBM     Published Date: May 16, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift Ė the convergence of physical and digital customer interactions Ė which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
     IBM
By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : insights, mobile, emm, security, lookout
     Lookout
By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a ďChallengerĒ in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
     Progress
By: Datastax     Published Date: Aug 15, 2018
Built on a production-certified version of Apache Sparkô and with integrated search and graph capabilities, DSE Analytics provides highly available, production-ready analytics that enables enterprises to securely build instantly responsive, contextual, always-on applications and generate ad-hoc reports. Read this white paper to learn about the specific features and capabilities of DSE Analytics, and why DSE Analytics is designed for the Right-Now Enterprise.
Tags : 
     Datastax
By: Mitto     Published Date: Jun 06, 2017
APQC reports that 30% of CFOs that are unhappy with their current planning solution.1 Most FP&A professionals want a planning and forecast process that is fast and repeatable. They want the financial data to be accurate and transparent to the deepest levels. They need planning tools that provide structure to streamline the process and flexibility to accommodate changes in the business. And they require analysis and reporting that bring visibility to the state of the business and lead to actionable insights. This paper details five best practices that Finance teams can follow to improve their planning and forecasting and influence the strategy of an organization.
Tags : veritas, backup, recovery, netbackup
     Mitto
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Alight Solutions     Published Date: Aug 01, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: ē Configuration, including a focus on Payroll and Financial Management ē Integrations and reports ē Test management
Tags : 
     Alight Solutions
By: Abacus Labs     Published Date: Jun 14, 2018
As more pressure is placed on the finance team to provide meaningful insights more frequently, it is becoming increasingly necessary to speed up business processes, as well as have immediate access to the most up-to-date information. The traditional expense reporting process is a drain from both perspectives. Using software to manage employee expenses can provide a more efficient means of managing the process, however most solutions are simply a digital version of the traditional paper process. This can limit the amount of time savings you can gain. This paper will demonstrate the time savings you can accomplish by implementing a real time expense reporting solution versus one that relies on employee generated expense reports.
Tags : 
     Abacus Labs
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com