respondents

Results 26 - 50 of 227Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : black duck, application security, security, open source, code, enterprise applications
     Black Duck Software
By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
A recent Argyle survey found that nearly 60% of marketing organizations currently use some form of Account-Based Marketing (ABM), while 28% plan to use it in the near future. This shows the rising importance of ABM in the marketing mix. However, ABM does have its challenges. Almost 30% of the same respondents claimed that maintaining personalized, but consistent interactions with prospects was the most prominent challenge in ABM. For more insight on how marketing executives are optimizing ABM, download this survey.
Tags : 
     Oracle Marketing Cloud
By: F5 Networks Inc     Published Date: Mar 30, 2018
Enterprises understand that greater efficiency, improved time-to value, and new opportunities can be gained by using cloud platforms; automating and accelerating their IT delivery; and putting technology to work in new ways to digitally transform their business. The difficult question is how to create an organization that is able to deliver these innovations. Skilled resources do exist, but they command high salaries and are in short supply. In fact, 70% of respondents to a recent Computing survey stated that their companies face a shortage of cloud skills. While bringing in experienced staff who can guide and lead new initiatives is often a necessity, it’s vital to concurrently train your existing staff and adopt solutions that narrow the gap between the realities of the present and the hopes for the future.
Tags : netops, skills, automation, enterprises, cloud, delivery, resources
     F5 Networks Inc
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
     Carbonite
By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
     SundaySky
By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Our recent primary research project solicited feedback from respondents to determine familiarity with, and plans for use of Hadoop ecosystem components. Download this white paper to learn more.
Tags : 
     Waterline Data & Research Partners
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
     Intralinks
By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
     Intralinks
By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : cloud security, crownpeak, security market, competitive dynamics, security, it management, data center
     Crownpeak
By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : cloud, cloud computing, hybrid environment
     F5 Networks Inc
By: Oracle EMEA     Published Date: Jun 04, 2019
IT Teams are reporting satisfaction with their organisation’s performance, but the gaps between their aspirations to drive innovation and thei ractions to see it through tell a different story. Across the organisation, respondents are not clear which department owns innovation. On top of that, the organisation is burdened by too many projects, which creates a conflict between quality and quantity. As a result, globally and across all lines of business, the majority of innovation projects do not make it to market. This problem is exacerbated by a lack of collaboration and clear leadership. Fortunately, organisations are placing value on the customer experience, thereby helping to move the business forward. Unfortunately, this momentum is hindered by the lack of priority that the organisation places on talent. Overall, organisations are generating ideas but struggling to execute them due to poor process and lack of focus. As a result, there is a big gap between ambition and ability, a
Tags : 
     Oracle EMEA
By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
     SAP
By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : best practices, security, technology, next gen
     IBM
By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
     IBM
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: IBM     Published Date: Mar 29, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: IBM     Published Date: Mar 30, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: Cisco     Published Date: Nov 18, 2015
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : cisco, enterprise, mobility, mobile strategy, networking, software development
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mid-market organizations globally are approaching mobility. Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and business leaders’ views, priorities, and objectives align and differ • Building a global and local view from over 1400 total respondents and over 570 who consider themselves mid-market, across 14 countries in every geography
Tags : 
     Cisco
By: 8x8 Inc.     Published Date: Aug 09, 2017
The 8x8-CCNG survey shows more and more companies are moving their contact centers to the cloud, and for a range of reasons that is appealing to almost every business center. Most prominent among those objectives are better business continuity, scalability, supporting remote workers, and integrating new technologies like multi-channel capabilities. Does your contact center employ remote agents? More than half do or respondents do! Across industries, prioritizing top talent and supporting remote workers is a growing concern. Cloud contact centers support this objective by making the full set of technologies and features available to all users, wherever they are located. Download now to learn more.
Tags : 8x8, cloud contact center, remote work, scalability, cloud computing
     8x8 Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com