gartner

Results 251 - 275 of 734Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: Dec 02, 2016
"Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Tags : palo alto, automated malware, security, cloud, gartner
     Palo Alto Networks
By: IBM     Published Date: Jan 19, 2017
With organizations keeping larger and larger quantities of data the question will come up that given dropping storage costs, does uncontrolled data growth even matter? It does matter, and in this IBM publication featuring Gartner research you will learn about this ever growing problem and ways for information managers to address solutions.
Tags : ibm, analytics, data, ecm, big data, information governance, data science
     IBM
By: IBM     Published Date: May 09, 2017
Shifting business requirements for digital content and new technologies are changing the ECM market. This Magic Quadrant analyzes these dynamics, their impact on ECM vendors and their implications for application leaders in charge of content management.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     IBM
By: Datastax     Published Date: May 14, 2018
The data management practices of old will no longer work. If you’re still trying to use a centralized approach, you are probably finding it difficult to keep up with the real-time demands of the Right-Now Economy. This special Gartner report describes the main drivers for modernizing data management — operational efficiency and analytics — and explains why balancing connecting data with collecting data will be a fundamental requirement for modern data management moving forward.
Tags : 
     Datastax
By: Datastax     Published Date: Jun 20, 2019
A Gartner survey found that 80% of respondents using public cloud are using more than one cloud service provider. This report assesses the shift to multicloud architecture, challenges being faced by data and analytics leaders, and the growing need for database management technology that enables integration of data across multiple clouds.
Tags : 
     Datastax
By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
     AppDynamics
By: Host Analytics     Published Date: Aug 01, 2017
There's a shift in the landscape of corporate performance management (CPM). The market is shifting to cloud-based vendors and moving companies like Host Analytics into the Leaders quadrants and shifting mega vendors out of it. We believe the 2017 Gartner Magic Quadrants for Financial and Strategic CPM reports are guaranteed to shake up the market and shape the coming year. These reports provide valuable insights into the latest market trends, the current Leaders, and key vendor evaluation criteria. Download the Gartner reports to learn: -Why cloud has become the preferred deployment model -Who the key vendors are and how they compare -Why mega vendors no longer dominate the market -Best practices in evaluating and selecting a vendor
Tags : gartner mq
     Host Analytics
By: Host Analytics     Published Date: Aug 01, 2017
Cloud financial corporate performance management solutions help the office of finance manage the financial close and apply appropriate controls throughout the accounting cycle. Application leaders should use this Magic Quadrant to identify vendors that are a good match for their business needs. The 2017 Gartner Magic Quadrant for Strategic CPM solutions provides valuable insights into the latest market trends, the current Leaders, and key vendor evaluation criteria. Download the Gartner report to learn: Why cloud has become the preferred deployment model Who the key vendors are and how they compare Why mega vendors no longer dominate the market Best practices in evaluating and selecting a vendor
Tags : 
     Host Analytics
By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: • Advanced traffic steering from failover to GSLB capabilities • Rapid record propagation time • Secondary DNS support • Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now! "
Tags : 
     Oracle + Dyn
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Organizations are looking to use DXPs as they move from web-centric to more pervasive, multichannel digital experiences. This Magic Quadrant will help those responsible for a range of customer-, employee- and partner-facing initiatives find the most suitable vendor for their needs.
Tags : gartner magic quadrant, gartner, digital experience, dxp, multichannel
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
The implementation of a distributed order management (DOM) system no longer has to be a daunting endeavor. Gartner surveyed 17 DOM software vendors and interviewed 25 retail clients with recent DOM implementation experience to develop a best practices guide. Read the report to understand the keys to a successful DOMS implementation.
Tags : gartner, order management, supply chain, business application
     Group M_IBM Q1'18
By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Nov 20, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
     Group M_IBM Q418
By: TIBCO Software     Published Date: Aug 13, 2018
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled application
Tags : 
     TIBCO Software
By: Menlo Security     Published Date: Jun 01, 2018
"According to Gartner, ""by 2022, 25% of enterprises will adopt browser isolation techniques for some high-risk users and use cases, up from less than 1% in 2017.” ""By effectively isolating endpoints from browser-executable code, attacks that compromise end-user systems will be reduced by 70%, while eliminating the need to detect or identify malware."" -Gartner What do these organizations know that you don’t? Learn more about why Gartner believes this to be true in this report."
Tags : 
     Menlo Security
By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
     Group M_IBM Q2'19
By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: Advanced traffic steering from failover to GSLB capabilities Rapid record propagation time Secondary DNS support Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now!
Tags : 
     Oracle + Dyn
By: Citrix     Published Date: Jun 15, 2018
The ADC market continues to evolve, with various new cloud-integrated and software-centric use cases having arisen. This report provides infrastructure and operations leaders with a snapshot of the market's transition and profiles vendors representative of emerging and very different approaches.
Tags : 
     Citrix
By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
     T Systems
By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : data protection, clearswift, data management
     Clearswift
By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking
     Clearswift
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com