idc survey

Results 1 - 25 of 50Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Alteryx, Inc.     Published Date: Sep 07, 2017
Download this IDC InfoBrief to get the full details of the survey, and understand the impact that advanced spreadsheet usage is having on the data preparation and analytic processes throughout organizations.
Tags : 
    
Alteryx, Inc.
Published By: AppDynamics     Published Date: Dec 08, 2017
IDC’s recent survey of enterprise IT and DevOps decision makers around the world finds they specifically note the need for insight into application performance status when making and managing these migration decisions
Tags : 
    
AppDynamics
Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, wireless application software
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, idc, lbs, wireless, wifi, mobility, it solutions, bandwidth management
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, mobile data systems
    
Cisco
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity, idc, cloudview survey, networking
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cloud, organization strategies, information technology, network management, application performance management, best practices, business intelligence, productivity
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco's Business Cloud Advisor provides a source of comparative cloud adoption levels supported by an IDC research model that integrates benchmarks calculated from the responses of over 3,400 organizations that took part in the IDC CloudView survey and analysis supported by IDC's business outcomes research. This analysis of your responses places You with 31% of the overall organizations in the benchmarked group at cloud adoption level 2 – Opportunistic.
Tags : 
cloud, organization strategies, information technology, networking, wireless, best practices, business activity monitoring
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
IDC’s 2014 CloudView study interviewed Director-level and above respondents from a global sample of 19,080 enterprise executives responsible for IT decisions. Of this sample the full survey was conducted on the 3,643 respondents actively using cloud for multiple workloads
Tags : 
    
Cisco
Published By: Cray     Published Date: Apr 08, 2014
Recent IDC surveys of the worldwide high performance computing (HPC) market consistently show that cooling today's larger, denser HPC systems has become a top challenge for datacenter managers. The surveys reveal a notable trend toward liquid cooling systems, and warm water cooling has emerged as an effective alternative to chilled liquid cooling.
Tags : 
cray, hpc, high performance computing, hpc, power and cooling, cooling, warm water cooling, server hardware
    
Cray
Published By: Cray Inc.     Published Date: Jul 22, 2014
The Cray® CS300-LC™ liquid-cooled cluster supercomputer combines system performance and power savings, allowing users to reduce capital expense and operating costs. The Trend Toward Liquid Cooling Recent IDC surveys of the worldwide high performance computing (HPC) market consistently show that cooling today's larger, denser HPC systems has become a top challenge for datacenter managers. The surveys reveal a notable trend toward liquid cooling systems, and warm water cooling has emerged as an effective alternative to chilled liquid cooling.
Tags : 
computing clusters, gpu computing, gpu cluster, x86 cluster, phi clusters, xeon phi clusters, hpc clusters
    
Cray Inc.
Published By: Dell EMC     Published Date: Jul 27, 2015
IDC White Paper - Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
workload awareness, hybrid cloud strategies, it solutions, workload priorities, idc
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
emc, enterprise, hybrid, cloud, strategy, networking, security, it management
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Read IDC’s Flash Survey and learn about how the digital transformation for industries, governments and economies is based on the three key enterprise IT mega trends: the modernization of IT legacy; harnessing cloud, mobile, big data analytics and social business; and innovation acceleration.
Tags : 
emc, idc, flash, digital, enterprise, analytics, networking, security
    
Dell EMC
Published By: Dell EMC     Published Date: May 12, 2016
Flash is changing the world. It is enabling innovation and business transformation by allowing companies to do things they simply could not have done before. IDC conducted a global survey of 1,305 executives involved in IT infrastructure and business transformation. The group with the highest flash adoption enjoyed superior business outcomes across a range of areas. Learn more about how flash is unlocking innovation and enabling business transformation with this IDC InfoBrief.
Tags : 
all-flash technology, business transformation, it infrastructure, flash adoption, enterprise applications
    
Dell EMC
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Performing PC’s are critical to businesses’ productivity and competitiveness, but hardware refresh is often extended well beyond its due date as IT departments’ resources are stretched or diverted to more urgent business critical projects. PC as a service (PCaaS) has recently emerged as a new model for IT procurement and management, and according to IDC’s latest PCaaS survey, satisfaction among early adopters in Europe is strong. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell PC Lifecycle     Published Date: May 21, 2018
Performing PC’s are critical to businesses’ productivity and competitiveness, but hardware refresh is often extended well beyond its due date as IT departments’ resources are stretched or diverted to more urgent business critical projects. PC as a service (PCaaS) has recently emerged as a new model for IT procurement and management, and according to IDC’s latest PCaaS survey, satisfaction among early adopters in Europe is strong.
Tags : 
    
Dell PC Lifecycle
Published By: EMC     Published Date: May 28, 2015
For this report, IDC conducted a survey of large enterprises around the globe to explore public, private, and hybrid cloud IT adoption trends.
Tags : 
emc, cloud computing, hybrid cloud, it cloud strategies, infrastructure, network architecture, mobile workers, smart phones
    
EMC
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In a recent study, IDC analyzed the business value and benefits of supporting network operations with Forcepoint NGFW solutions. The research included interviews with eight organizations relying upon Forcepoint’s NGFW to connect and protect their networks and business operations. IDC created a model based upon their analysis to identify the costs and real benefits of deploying Forcepoint NGFW. The highlights of this analytical model are captured in their Business Value Snapshot; and the complete results are available for download now in the IDC Quantifying the Operational and Security Results of Switching to Forcepoint NGFW Whitepaper. Download the Snapshot now Download the IDC Whitepaper now to learn how the eight organizations surveyed realized improved efficiency, availability and security with Forcepoint NGFW, as well as a return of cost in only seven months and an average 5-year ROI of 510%.
Tags : 
    
Forcepoint
Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network, networking, knowledge management, data management
    
ForeScout
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.