assessment

Results 251 - 275 of 527Sort Results By: Published Date | Title | Company Name
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today."
Tags : 
ecommerce, retail, ecomerce software, ecommerce platform, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today. "
Tags : 
    
ChannelAdvisor
Published By: Infosys     Published Date: Sep 11, 2018
Infosys has been recognized as a ‘Leader’ in NelsonHall’s Vendor Evaluation and Assessment (NEAT) report on big data and analytics services 2018.We have also been highly rated for our focus on automation. Our ability to meet future client requirements as well as deliver immediate benefits such as analytics, data management and support functions to our clients with a specific focus on process automation enabled us to secure this position.
Tags : 
    
Infosys
Published By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server
    
Acronis
Published By: McAfee EMEA     Published Date: Mar 14, 2018
This IDC study uses the IDC MarketScape model to provide an assessment of a number of providers participating in the endpoint specialized threat analysis and protection market.
Tags : 
    
McAfee EMEA
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Download this assessment of Oracle Database Appliance from Nucleus Research, to discover the various compelling features of the appliance.
Tags : 
database appliance, sql, high availability, oracle
    
Oracle Corp.
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
Symantec.cloud
Published By: EMC Corporation     Published Date: Mar 20, 2014
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Tags : 
emc, rsa, ecat, enterprise compromise assessment tool, malware threats, malware detection, compromise assessment, compromise monitoring
    
EMC Corporation
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: HP and Intel® Xeon® processors     Published Date: Dec 19, 2012
Learn more how HP ProLiant Gen8 e-Series servers are simple, reliable, affordable solutions that let a growing business boost performance as well as productivity.
Tags : 
hp proliant, gen8, smb, impact assessment, proliant servers
    
HP and Intel® Xeon® processors
Published By: Jive Software     Published Date: Feb 24, 2014
With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective social business software solution.
Tags : 
jive, human resources, social software, social media, workforce, workforce magagement, social business, social business software
    
Jive Software
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management
    
Rsam
Published By: Staples     Published Date: Jun 23, 2017
Want to save time and money? Just ask a facilities expert. See what a site assessment can do for your facility.
Tags : 
save time, save money, benefits, facility assessment, efficiency, productivity
    
Staples
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Published By: Frontier Communications     Published Date: Jul 18, 2017
What type of IT-PRO-INNER-GEEK are you? Take this quiz to find out.
Tags : 
    
Frontier Communications
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
    
Trillium Software
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : 
business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : 
ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion
    
Mainline Information Systems
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: