erp vendor

Results 1 - 25 of 252Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: May 09, 2011
C&C pros will face several challenges when mobilizing enterprise content strategies: addressing fragmented mobile device support, tailoring content delivery to device form factors, and navigating ECM vendor support options. For now, a segmented, use-case-driven approach will be the norm.
Tags : 
adobe, ecm, mobile device, c&c, enterprise content management, collaboration, ecm
    
Adobe
Published By: Adobe     Published Date: Sep 26, 2013
Enterprises strive for ever-greater business impact from their online presence, demanding more from Web content management than it has traditionally delivered. In this Gartner report, you'll find how well WCM vendors are responding, providing insights for buyers and those reviewing their existing applications.
Tags : 
web content management, buyer insights
    
Adobe
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : 
openstack, cloud applications, load balancing, application security, cloud application delivery, enterprise applications
    
Appcito
Published By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
    
AppDynamics
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report, security, best practices, business activity monitoring, business analytics, business intelligence
    
ArborNetworks
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market, best practices, business integration, business intelligence, business management
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 20, 2013
Given the evolution of past major advances in wireless-LAN technologies, it should come as no surprise that products based on the still-in-development IEEE 802.11ac standard are now appearing across the board, from residence to enterprise. Just as was the case with 802.11g and 802.11n, the standards-development process is now far enough along that the semiconductor community is shipping in volume, the Wi-Fi Alliance has been able to issue an initial interoperability specification, and system-vendor products offering up to 1.3 Gbps are now available at prices very close to those of 802.11n APs but with on the order of a 30% improvement in price/performance on a spectral-efficiency basis and from 100% to more than 200% in performance overall.
Tags : 
security, assurance strategies, initial deployment, wireless-lan, wi-fi, gbps, enterprise, best practices, technology
    
Aruba Networks
Published By: Aspect Software     Published Date: Nov 06, 2014
Download Aspect’s newsletter, “Serving and Engaging the Digital Consumer - from Self-Service to Agent-Assisted” for insights on how the cloud, omni-channel communications and mobility are revitalizing customer self-service. Included is a complete copy of the latest Gartner Marketscope for IVR Systems and Enterprise Voice Portals, which provides insights on the state of the market and top vendors. Download to learn more!
Tags : 
aspect, digital consumer, self service, voice response market, it leads, ivr investments, omni channel, omnichannel, omni-channel, it management, ivr, marketscope, voice portal, self-service
    
Aspect Software
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 01, 2018
Why Read This Report The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how IT pros should be able to leverage essential cloud services while meeting enterprise security requirements by taking into consideration a number of fundamental security principles and best practices, by understanding the specific security needs of an enterprise and evaluating different cloud environments and models, and by asking vendors the right questions
Tags : 
enterprise it, cloud deployments, cloud platorms, public cloud, private cloud, hybrid cloud, saas, iaas, security
    
AT&T
Published By: Automation Anywhere     Published Date: Jul 16, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Automation Anywhere
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority – and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally aren’t a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority – and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally aren’t a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
analyst, roi, rpa, artificial intelligence
    
Automation Anywhere APAC
Published By: Avaya     Published Date: Jun 15, 2016
Gartner Report: Critical capabilities for your LAN access infrastructure Does your wired or wireless LAN access solution have the right capabilities for your enterprise? See how Gartner ranked 14 vendors in six common enterprise use case scenarios in this report.
Tags : 
networking, best practices, software, technology, productivity
    
Avaya
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa, authentication, data protection
    
Aveksa
Published By: B Channels     Published Date: May 01, 2018
Many Enterprise & Mid-Market I.T Vendors are offering or moving towards Hybrid Cloud. bChannels has the right expertise and credentials to assess a vendor’s ecosystem & program needs to find, connect and nurture partners on a Hybrid Cloud proposition. Download this paper to find out more
Tags : 
    
B Channels
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
BlackBerry Cylance
Published By: Blue Prism     Published Date: Mar 15, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Blue Prism
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400, openvms, extract-transfer-load, etl, business service managemen, bsm, service level managemen, slm, mainframe, windows, unix, linux, custom applications
    
BMC Control M
Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration, technology, it management, knowledge management, data management, data center
    
BMC Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.