evaluate

Results 126 - 150 of 664Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Forrester evaluated the strengths and weaknesses of top Mobile Development vendors. Get the report to learn why Oracle makes an impact and is growing in deployment options and analytics.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely
Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Because of its location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both function and finance. This paper explores elements to evaluate, like network performance, and security.
Tags : 
application delivery controller, load balancer, load balancing, adc, application delivery, application availability, application security, application scalability
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access
    
F5 Networks Inc
Published By: Logicalis     Published Date: Sep 23, 2013
Why You Should Reevaluate Your DR Strategy Today
Tags : 
logicalis, disaster recovery, dcaas, data center-as-a-service, dr strategy
    
Logicalis
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: Dell EMC     Published Date: Aug 22, 2017
GARTNER HAS NAMED DELL EMC AS A LEADER FOR DISTRIBUTED FILE SYSTEMS AND OBJECT STORAGE. This report evaluates Distributed File and Object Storage vendors that help customers deal with the rapid growth in unstructured data. Isilon, the industry leader in scale-out NAS storage, and Dell EMC Elastic Cloud Storage (ECS), were both recognized as leaders in this Gartner report. We believe this recognition demonstrates our industry-leading capabilities to help prepare our customers for their digital future.
Tags : 
    
Dell EMC
Published By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : 
documents, workflows, business process, document management
    
Brother
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : 
security, endpoint, zero day exploit, forrester, phishing, ddos
    
Palo Alto Networks
Published By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management
    
Dynatrace
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive
    
Akamai Technologies
Published By: Genesys     Published Date: Aug 11, 2016
Download now! Learn how to evaluate the financial impact of your Omnichannel Engagement Center Solution investment. Also learn how you can achieve the following benefits: • 50% reduction in cost to integrate new contact center agents • 50% reduction in customer abandonment at key points in the customer journey • 12.5% improvement in agent handle time
Tags : 
genesys, omnichannel engagement center, engagement center solution, contact center, contact center agents, customer experience
    
Genesys
Published By: Oracle ODA     Published Date: Dec 06, 2016
It’s no secret that data-driven business strategies have resulted in unprecedented data growth and management of more complex database structures. Not only that, but IT leadership continues to play a strategic role in the direction of the business, especially as these disruptive business strategies come into play. This white paper addresses some of the key considerations IT management should have as they evaluate their IT roadmap and infrastructure to meet these dynamic enterprise needs.
Tags : 
    
Oracle ODA
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: CrowdStrike     Published Date: Mar 15, 2017
It’s time to upgrade your organization’s legacy Antivirus (AV). Here is what you need to know before replacing your AV solution. The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Oct 12, 2017
There are five essential pieces to a sound backup and disaster recovery (BDR) plan, and IT pros who follow these steps are able to feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through BDR deployments, to learn these five fundamentals. Understand how to size your environment, evaluate your BDR capabilities, and test your system for any surprises.
Tags : 
bdr, recovery capabilities, backup data repositories, data center, over - the - wire, remote
    
Carbonite
Published By: Virgin Pulse     Published Date: Jun 05, 2017
The Employee Well-being Platforms Buyer’s Guide will take the guesswork out of your decision. Learn how to properly evaluate the options on today’s market and determine what features matter most to you.
Tags : 
employee well-being platform, well-being software, well-being solutions, wellness solutions, employee wellness solutions, wellness solutions, employee wellness solutions, well being solutions
    
Virgin Pulse
Published By: FinancialForce     Published Date: Dec 01, 2017
The Professional Services industry is in its fourth consecutive year of steady growth and not slowing down. If you are looking to grow your business it's crucial to evaluate your current systems and processes to ensure they are drivers and not road blocks. Download this whitepaper and read the top 9 reasons why Professional Services works better on the Salesforce platform to help drive growth and bridge the services and sales divide for smarter services delivery.
Tags : 
    
FinancialForce
Published By: Workday     Published Date: Jul 19, 2017
It is an exciting and challenging time for CFOs as their role continues to evolve in a dynamic, everchanging business environment. To keep up with the pace of change and steer their companies toward growth, CFOs need to focus on strategic value and how they can support the broader organization. Driving growth, contending with an ever-evolving regulatory environment, delivering deeper and more-strategic business insights, and staying agile as demands change requires a new kind of finance organization. All of this change will continue to lead CFOs to look inward at their finance systems and evaluate if they can help support business demands today and in the future.
Tags : 
cloud, cfo, financial systems, data insights, strategic value, organization optimization, file systems
    
Workday
Published By: Monetate     Published Date: Oct 12, 2018
Product recommendations are a proven way for marketers to drive sales, boosting the revenue potential of every shopping experience and increasing customer engagement overall. However, most current recommendations tools have not kept up with the level of personalisation that customers have come to expect, and they often fall short of the precision that marketing teams need to create meaningful business impact. It may be time to reevaluate whether your solution is doing all it can to meet the needs of your customers and your team.
Tags : 
product, recommendation, solution, customer, experience, monetate
    
Monetate
Published By: Bluecore     Published Date: May 07, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most retail marketers use email technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your retail marketing program with the next generation of email marketing technology. This guide explores how to identify when it's time for a change, exactly what your team needs to know to prepare for a successful change and how to best evaluate modern email marketing technology for retail.
Tags : 
    
Bluecore
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library