it survey

Results 51 - 75 of 776Sort Results By: Published Date | Title | Company Name
Published By: Canon Solutions America     Published Date: May 15, 2019
A data breach can erode public trust and jeopardize your transformation. But in a Center for Digital Government survey, only 26% of respondents were very confident their print environment is secure. Learn where your organization may be vulnerable.
Tags : 
    
Canon Solutions America
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. To find out more download this whitepaper today.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: May 09, 2019
In such a competitive business market, retaining the best talent is crucial. Knowing what makes them want to walk out the door is the first step in keeping them. The good news is that business leaders recognize the peril they face - and the need to do something about it. In a recent survey, 45% said they fear becoming obsolete in three to five years; 73% agree on the business need to prioritize technology, and 66% are planning to invest in IT infrastructure and digital skills leadership. However, investment without strategy is unlikely to succeed. Because innovation comes from people, investment must foster human creativity. Investment in technology that enables workers to address new challenges in new ways will give rise to new business initiatives, happier customers, and superior corporate financial performance. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: - Best device experience - Unified endpoint management - Enterprise collaboration The purpose of this study is to provide readers with a framework to evaluate the potential impact of these Workforce Enablement Solutions on their organizations.To better understand the benefits, costs,and risks associated with investment in these solutions, Forrester interviewed eight large enterprise customers with years of experience using Workforce Enablement Solutions—this data was supplemented by a survey of over 700 organizations. Download this whitepaper to find out more.
Tags : 
    
Dell EMC EMEA
Published By: Engage2Excel     Published Date: Apr 29, 2019
Teleworking has grown 115% in the past decade, according to the Society for Human Resources. However, in 2017, a number of large employers made headlines by abandoning their telework initiatives, citing the desire to improve communication, collaboration and teamwork. This move was surprising to many for two reasons: • Nearly three-quarters of millennials express a desire to have more opportunities to work remotely1 . • Employers can save $11,000 per half-time telecommuter2. Do employees who work remotely feel less recognized, exhibit lower engagement levels or experience less attention from their manager? To find out, we conducted a regression analysis on our 2018 survey of 5,000 employees nationwide. The results presented on the following pages may surprise you.
Tags : 
    
Engage2Excel
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric
Published By: MuleSoft     Published Date: Apr 23, 2019
Digital transformation is front and center and this year, it’s all about connecting the customer experience. MuleSoft surveyed 650 IT leaders from global enterprises. The research shows that the vast majority (97%) of companies are currently undertaking or planning to undertake digital transformation initiatives. Nine out of 10 IT leaders believe if they don’t complete those initiatives, their companies will lose revenue. How does your company stack up? Download the 2019 Connectivity benchmark report to find out: The top digital trends of 2019. The evolving role of IT as a business catalyst. Which strategies leading enterprises are adopting to get ahead.
Tags : 
    
MuleSoft
Published By: DataCore     Published Date: Apr 23, 2019
In our developing digital economy, IT is a strategic asset. By effectively leveraging data, businesses become more operationally efficient, create more differentiated customer experiences, and develop new products and business models. However, unlocking those benefits requires a higher degree of execution by IT. Simply keeping pace with demand is no longer good enough; IT needs to help drive the business’s digital pursuits. The increased pressure on IT has amplified complexity, as well—66% of IT decision makers surveyed by ESG say IT is more complex than it was just two years ago.1 Demands being placed on IT are scaling relentlessly, and the tools IT teams use are in a constant state of evolution. Integrating and optimizing those new infrastructure technologies while managing existing investments is a perpetual burden. IT organizations, therefore, have two choices: either increase their personnel and budgets enough to survive the evolution with just traditional tools, or redirect those
Tags : 
software defined storage, hyperconverged, storage consolidation, storage management, data migration, storage migration
    
DataCore
Published By: Flexera     Published Date: Apr 22, 2019
The annual RightScale State of the Cloud Survey research team has now joined Flexera—and our newest Report doesn't disappoint. Check out some of our key takeaways for 2019. The #1 cloud priority in 2019 is cost optimization. Most enterprises already spend over $1 million a year in public cloud, yet users underestimate the amount of their wasted cloud spend. With companies now running 79% of their workload in cloud, this rapid rise poses a challenge for IT teams whose business units often control the purse strings. How does your cloud infrastructure compare? This leading survey of 786 corporate cloud users gives you a by-the-numbers look, from small business to large enterprise, from healthcare to government and across a wide range of industries. Get all the details in this eighth annual report. Download it today.
Tags : 
    
Flexera
Published By: Flexera     Published Date: Apr 22, 2019
The annual RightScale State of the Cloud Survey research team has now joined Flexera—and our newest Report doesn't disappoint. Check out some of our key takeaways for 2019. The #1 cloud priority in 2019 is cost optimization. Most enterprises already spend over $1 million a year in public cloud, yet users underestimate the amount of their wasted cloud spend. With companies now running 79% of their workload in cloud, this rapid rise poses a challenge for IT teams whose business units often control the purse strings. How does your cloud infrastructure compare? This leading survey of 786 corporate cloud users gives you a by-the-numbers look, from small business to large enterprise, from healthcare to government and across a wide range of industries. Get all the details in this eighth annual report. Download it today.
Tags : 
    
Flexera
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
IBM Institute for Business Value report discussing how multicloud environments are proliferating in surveyed organizations, the benefits of multicloud management and an approach to managing multicloud environments
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Avaya     Published Date: Mar 22, 2019
Cloud technology is quickly becoming the default at companies of all sizes. Nine out of ten companies have already moved at least some of their applications or computing infrastructure to the cloud or plan to do so in the next 12 months. IT spending reflects this trend, with the average investment in cloud rising nearly 36% from two years ago. What’s more, cloud adoption isg rowing across all delivery models, with examples of every kind of application and workload on every kind of platform, according to a recent IDG survey. The survey results represent the practices and opinions of 550 IT decision-makers whose organizations have either already adopted cloud technology or plan to do so within the next three years.
Tags : 
    
Avaya
Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Mar 07, 2019
An On-Demand Webinar with the Economist Intelligence Unit (EIU) and a leading CFO, exploring the changing role of today’s CFO, based on EIU’s recent CFO survey. Learn how CFOs and Finance: • Are well-placed to exercise digital leadership • Make relevant data visible across the business • Develop goals and metrics for digital success
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike
Published By: Genesys     Published Date: Feb 12, 2019
To remain competitive in an increasingly customer-centric world, mid-sized organizations are undergoing digital transformations of their contact centres. IDC surveyed companies in 27 countries globally, including companies from Europe, Middle East and Africa (EMEA), to examine the current market dynamics of cloud-enabled customer service environments. Eighty-five percent of the respondents fell within the small to mid-sized category with contact centres with 300 seats or fewer. Get this paper to access complete survey results for EMEA and to gain key insights including: Nearly 65% of respondents in EMEA already use or are in the process of implementing cloud-based contact centre solutions Only 13% of respondents in EMEA indicated that they currently are using a public cloud environment, the lowest among all geographies worldwide Drivers, benefits and challenges for adopting cloud contact centre technology
Tags : 
    
Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.