evaluate

Results 351 - 375 of 663Sort Results By: Published Date | Title | Company Name
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : 
mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good
    
Motorola
Published By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : 
safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security
    
SafeNet
Published By: Marketo     Published Date: Mar 22, 2018
As an IT professional evaluating marketing platforms, it’s important to think about whether you can trust the platform to scale to accommodate your organization’s ongoing marketing and channel needs. Given the fast pace of channel proliferation and changing digital strategy priorities, you play a critical role in helping marketing build a technology stack that can easily scale to support its future needs. Download this whitepaper to learn about the essential criteria IT should evaluate to identify the solution that will support your marketing team’s short- and long-term needs and equip them to succeed.
Tags : 
    
Marketo
Published By: Dell Windows Server     Published Date: Jan 16, 2009
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008® Hyper‐V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the Dell virtualization solution components that best fit their requirements.
Tags : 
dell, microsoft windows server 2008, hyper-v, reference architecture, virtualization ra
    
Dell Windows Server
Published By: NCM Fathom     Published Date: Dec 09, 2011
The lights, the atmosphere, the big screen - it all comes together at the cinema. A great brand deserves a terrific event that mesmerizes its audience and employees. Planning a cinema event is a lot like directing a movie from the cutting room to the red carpet. For your event, evaluate how to deliver without giving too much away. You must know what will connect with your audience.
Tags : 
ncm fathom, creative content, cinema, audience, customer
    
NCM Fathom
Published By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : 
customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
    
iKnowtion
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This ESG Lab Validation Report sponsored by HP + Intel examines a number of backup and recovery solutions and evaluates their ease of implementation as well as their ability to improve reliability and reduce costs.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This white paper sponsored by HP + Intel evaluates a solution that aims to enable the movement of data without physical limitations. Read now and see how this could enable agility and efficiency.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: Yammer     Published Date: May 23, 2012
The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, "The Forrester Wave: Activities Streams, Q2 2012", Forrester Research Inc. evaluated five social software vendors with core strengths in the stream based on the overall strength of vendors' current offerings, a clear product strategy, and vendor market presence. In a detailed look at the space, Forrester named Yammer as a leader.
Tags : 
yammer, enterprise social, integration, cloud, adoption
    
Yammer
Published By: Salesforce.com     Published Date: May 14, 2013
CRM Market Evaluation by Nucleus Research. Get the CRM Technology Value Matrix that evaluates the usability and functionality of CRM solutions that support sales, marketing, and customer service for any-sized business.
Tags : 
crm technology, crm solutions, salesforce, social sales
    
Salesforce.com
Published By: Payscale, Inc     Published Date: Jun 15, 2018
A total rewards program is made up of several elements — WorldatWork lists them as compensation, benefits, worklife effectiveness, recognition, performance management and talent development — so it’s no wonder that putting together successful packages is a complicated, sometimes stressful, endeavor. There’s so much to consider and evaluate, and if you’re like most of your HR and compensation colleagues, you have a lot of questions. Well hey — that’s what this ebook is here for. Rusty Lindquist, VP of Thought Leadership at BambooHR; Dave Smith, Chief Product Officer at PayScale and Jill Christensen, Founder of Jill Christensen Intl., recently hosted a panel discussion in which they offered insights and tips on the biggest, most frequent concerns around total rewards. What follows is a distillation of their very helpful advice on the most common
Tags : 
    
Payscale, Inc
Published By: BMC Software     Published Date: Mar 17, 2014
CIOs and IT organizations must reevaluate their operations in order to keep pace with the changing nature of today's business. Fortunately, there’s a new generation of ITSM solutions available via a more flexible SaaS delivery platform. They make the basic tasks of day-to-day ITSM easier, and also address challenges associated with an increasingly face-paced and demanding work environment. This step-by-step guide helps CIOs select the right cloud-based ITSM platform to capitalize on today's latest innovations.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions
    
BMC Software
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework
    
RSA
Published By: Coupa Software     Published Date: Nov 04, 2014
Forrester Research evaluated the 11 most significant eProcurement providers against over 60 different criteria. This report details their findings about how well each vendor fulfills the criteria and where they stand in relation to each other. Sourcing and vendor management professionals can use this report to select the right partner for their procure-to-pay (P2P) projects.
Tags : 
eprocurement, sourcing and vendor management, procure-to-pay, vendor, procurement, p2p
    
Coupa Software
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: Oracle     Published Date: Jun 20, 2016
In this report Forrester Consulting evaluates the shift in the marketplace from on-premises commerce infrastructures to modern SaaS solutions. The report explores the range of maturity among enterprises that are making this shift to test the hypothesis that companies that leverage cloud commerce intelligently using best practices experience increased business success.
Tags : 
mobile devices, ecommerce, best practices, productivity
    
Oracle
Published By: Acrolinx     Published Date: Apr 01, 2015
In January 2015, Acrolinx launched a research project to read and evaluate the world’s content. Using a proprietary linguistic analytics engine, our software reviewed 150,000 individual, public-facing web pages from 340 companies around the world. That represents 20 million sentences and over 160 million words. Read this white paper to read the findings of this research report and the effect of content.
Tags : 
    
Acrolinx
Published By: Wyng     Published Date: Jul 27, 2016
In May 2016, Offerpop commissioned Forrester Consulting to evaluate how marketers view the importance of UGC in building brand awareness and improving marketing and advertising campaigns. Forrester tested the hypothesis that marketers who inspire the creation and sharing of UGC and leverage it at each point of the customer life cycle see significant benefits.
Tags : 
offerpop, marketing, marketing success, user-generated content, content strategy, forrester, ugc, brand awareness
    
Wyng
Published By: IBM     Published Date: Oct 13, 2017
This BARC document is the third edition of our BARC Score business intelligence vendor evaluation and ranking. This BARC Score evaluates enterprise BI and analytics platforms that are able to fulfill a broad set of BI requirements within the enterprise. Based on countless data points from The BI Survey and many analyst interactions, vendors are rated on a variety of criteria, from product capabilities and architecture to sales and marketing strategy, financial performance and customer feedback.
Tags : 
barc. business intelligence, analytics, customer feedback
    
IBM
Published By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
    
Frontier Communications
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Globality     Published Date: Apr 05, 2018
Cost pressures and demand for specialised, technical expertise are causing companies to re-evaluate their consulting partnerships and consider new kinds of advisers.
Tags : 
globality, consulting, expertise, return on investment, it advice, management advice, outsourced management, marketing, technology
    
Globality
Published By: Microsoft     Published Date: Jul 20, 2018
If you’re like most developers, you spend about two-thirds of your time building and the rest of your time learning. Sometimes your research is proactive, based on personal interest or a desire to maintain your skills, but more likely it’s out of necessity—learning what you need to tackle your next big project. Not long ago, new projects assumed an on-premises or hosted approach, forcing you to spend considerable time on essential requirements like scalability, availability, and security. Today, you still must deliver on those essentials, but the apps you’re building need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and delight users in new ways. Cloud services not only deliver “built-in” scalability and availability, but also provide an unprecedented range of prebuilt functionality for driving innovation into your apps—ready to evaluate for your next project, without your having to worry about physical infrastructure and the related ove
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by shifting some or all their management and operations from on-premises, hosted, and outsourced implementations to Azure’s infrastructure-as-a-service (IaaS) offering. The purpose of this study is to give readers a framework to evaluate the potential financial impact, or ROI, of leveraging Azure IaaS for their organizations. Benefits gained by interviewed customers that migrated or re-architected some or all workloads from on-premises to IaaS include: › Greater revenue opportunities from business-to-business (B2B) and customer web channels with a solution that is more mobile and reliable, and meets scale and seasonality needs. › Increased profits from those revenues. › Improved production efficiency. › Reduced datacenter, IT resource, and outsourcing costs. › Easier and faster software and hardware management (such as p
Tags : 
    
Microsoft
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Resource Library