research report

Results 326 - 350 of 454Sort Results By: Published Date | Title | Company Name
Published By: Ensight     Published Date: Dec 03, 2008
Hampered by a time consuming approach to delivering their reports, the team of financial markets research analysts at Rand Merchant Bank needed to find a distribution method that could cope with the growing popularity and performance demands of their research service.
Tags : 
ensight, financial markets research, rand merchant bank, email management tool, research mailings, ecrm
    
Ensight
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk
    
Iovation
Published By: SAS     Published Date: Mar 19, 2013
A Research Report Detailing How Organizations are Using Data Visualization to Succeed with Big Data
Tags : 
big data, visualization, interactive, data, data visualization
    
SAS
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management
    
CarbonBlack
Published By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : 
epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy
    
Esker
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies
    
Conductor
Published By: IBM     Published Date: Oct 24, 2013
This analyst research paper contains findings from Aberdeen Group on the financial reporting pressures, challenges faced by organizations particularly with regulatory mandates
Tags : 
ibm, aberdeen group, financial reporting pressures, financial challenges, analyst insight, disclosure management, organizational transparency, organizational collaboration, deman for data, utilize the data, business intelligence, real-time data initiatives, real-time financial reporting, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 04, 2014
Today, as customers increasingly turn to digital channels to research products, shop, and purchase — and as employees arrive in the workplace conditioned by engaging consumer Web, mobile, and social experiences — organizations can't afford to be left behind because of legacy investments. Customers and employees alike expect an exceptional digital experience. The good news, as our TCO study shows, is that most organizations can justify the cost of IBM's Exceptional Digital Experience solutions based on quantifiable hard dollar savings within a relatively short period of time. Read this IDC Report to learn more about IBM's Exceptional Digital Experience Solutions
Tags : 
ibm, idc, digital experience, digital marketing, customer engagement, web marketing, mobile marketing, social media, tco, customer engagement
    
IBM
Published By: Adobe     Published Date: Nov 05, 2014
The more consumers interact with media, the more marketers know about their habits, and the less time they need to plan and guess actions. Mix Optimization Takes Over Planning, a new Forrester Research, Inc. report, shows why it’s important for marketers to transition to a marketing optimization platform and provides key steps that will help enable the transition.
Tags : 
mix optimization, marketing platform, planning cycles, data collection
    
Adobe
Published By: Adobe     Published Date: Jan 12, 2015
The more consumers interact with media, the more marketers know about their habits, and the less time they need to plan and guess actions. Mix Optimization Takes Over Planning, a new Forrester Research, Inc. report, shows why it’s important for marketers to transition to a marketing optimization platform and provides key steps that will help enable the transition.
Tags : 
adobe, marketing, mix, optimization, data, analytics, mix, brands, scientific, planning, process, testing, dsp, dmp, programmatic, insights, campaign
    
Adobe
Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, networking, security, it management
    
Incapsula
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
In a second-quarter 2014 Gigaom Research survey of 500 IT decision-makers at large U.S. companies, we identified strategic buyers as those who report using cloud resources for new business and revenue streams as opposed to those who don’t.
Tags : 
    
Dell Cloud Marketplace
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations’ security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : 
siem, esg, jon oltsik, golden hour, attack detection and incident response
    
Intel Security
Published By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : 
cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications, it career advancement
    
BitSight Technologies
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Published By: IBM     Published Date: Nov 04, 2014
Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications can generate unprecedented levels of engagement with customers wherever they are. Find out how to make sure every message they receive is relevant—and right on target.
Tags : 
mobile notifications, mobile apps, mobile consumers, site sales, push notification
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Jan 09, 2015
Early adopters of an extended 360° view will get competitive advantages over their rivals and this will force laggards to adopt a similar approach or lose business.
Tags : 
ibm, big data, insights, mdm, infosphere, data management, dashboards, value, data matching, analytics, challenges, competitive advantage, loyalty, implementation, 360, degree, customers, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities
    
IBM
Published By: IBM     Published Date: May 13, 2016
Download this research report now to learn more about the financial and operational impacts on asset-intensive industries worldwide.
Tags : 
ibm, watson, iot, cognitive asset management, asset management, iot, knowledge management
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!