2012

Results 126 - 150 of 251Sort Results By: Published Date | Title | Company Name
Published By: OpTier     Published Date: Mar 11, 2013
In the Information Technology (IT) industry, 2012 has been the year of Big Data. From a standing start toward the end of the last decade, Big Data has become one of the most talked about topics.
Tags : 
optier, big data, enterprise data warehouse, edw, nosql
    
OpTier
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
Arbor
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: hybris software     Published Date: Mar 04, 2013
This report details findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness and strategy professionals select the right partner for B2C online and multichannel commerce solution.
Tags : 
b2c, ecommerce, multichannel, ebusiness, commerce suite
    
hybris software
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : 
debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence
    
Interactive Intelligence
Published By: PRQA     Published Date: Feb 26, 2013
This paper discusses the thinking and motivation which has led to the publication of the latest version, MISRA C:2012
Tags : 
    
PRQA
Published By: Oracle     Published Date: Feb 14, 2013
In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
hr technology, human resources, best practices, 2012, talent management, business environment
    
Oracle
Published By: Oracle     Published Date: Feb 14, 2013
In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
top talent management, best practices, 2012, talent driving results, leveraging talent, hr technology, oracle
    
Oracle
Published By: Semcasting     Published Date: Feb 14, 2013
This White Paper illustrates three important lessons learned as a result of executing highly targeted campaigns for 36 elected offices in November of 2012.
Tags : 
hyperlocal targeting, hyper-local targeting, location-based targeting, hyperlocal advertising, hyper-local advertising, digital marketing, ip address targeting, ip geo targeting
    
Semcasting
Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In March 2012, HP Storage commissioned a study to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying HP 3PAR Storage.
Tags : 
roi, storage, study
    
HP and Intel® Xeon® processors
Published By: F5     Published Date: Feb 07, 2013
In this report, Gartner evaluates vendors’ strengths and weaknesses, and places vendors on the Magic Quadrant based on ability to execute and completeness of vision for application delivery controllers.
Tags : 
gartner magic quadrant, application delivery controllers, gartner survey, gartner review, controllers
    
F5
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
McAfee
Published By: LogMeIn     Published Date: Feb 06, 2013
This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers. The data was collected via an online survey from August to October 2012.
Tags : 
customer satisfaction, support organizations, technical support, products, services
    
LogMeIn
Published By: Symantec     Published Date: Jan 31, 2013
Read this comparison test to find out which antivirus Protection product is right for you.
Tags : 
antivirus, endpoint, protection, security, test, comparison, symantec
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
endpoint protection, security, best practices, survey
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8
    
Symantec
Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention
    
IBM
Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security, phishing
    
Websense
Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner
    
LogRhythm
Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
    
ForeScout
Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media, mobile, byod
    
IBM
Published By: GlobalEnglish     Published Date: Jan 23, 2013
The Business English Index was launched to track the competency across companies, industries and geographies in business communications using English. To read more about the metrics and BEI score across countries and industries, read this whitepaper
Tags : 
business english index, english, communication, business, business knowledge, workforce performance
    
GlobalEnglish
Published By: Idera     Published Date: Jan 22, 2013
STOLEN DATA LIVES ON; LOST DATA IS LOST FOREVER.
Tags : 
idera, data breaches, 2012, lost data, sony data thefts of 2011, data thefts, sony online entertainment, play station network
    
Idera
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library