gartner

Results 526 - 550 of 551Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas
    
Okta
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Silver Peak     Published Date: Aug 18, 2016
There’s been a lot of numbers passed around when it comes to software-defined wide area networks (SD-WANs). IDC predicts the market will reach $6 BILLION BY 2020. Gartner suggests 30 percent of enterprises will have deployed an sd-wan BY 2019.
Tags : 
    
Silver Peak
Published By: Hewlett Packard Enterprise     Published Date: Apr 01, 2016
There are four IT megatrends that will transform IT and the business in the next few years. These four trends are all connected, all overlapping, all a part of an overall enterprise transformation. Success with these trends will be the primary driver for success in a world that is becoming much more digital and real-time. But many companies are still failing to connect the dots. Listen as Gartner VP Distinguished Analyst Tom Bittman discusses how to effectively navigate the four megatrends as a part of a holistic enterprise transformation the drives results.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build
Tags : 
    
Oracle
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
"Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Tags : 
palo alto, firewall, check point software technologies, gartner
    
Palo Alto Networks
Published By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : 
business agility, data usage, network infrastructure, information technology
    
Juniper Networks
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: IBM     Published Date: Jul 31, 2017
Read this Magic Quadrant for EFSS report by Gartner to see how the EFSS vendors, including Box shown as a leader in the Magic Quadrant, are increasingly addressing digital workplace enablement to improve modern user productivity and cloud-based content collaboration for the creation of a digital workplace
Tags : 
gartner magic quadrant, digital workplace, could-based content, collaboration
    
IBM
Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Read the Gartner report for an overview of the mobile threat defense market (MTD), including detailed reviews, analyses, and recommendations and an assessment of 17 leading MTD vendors.
Tags : 
gartner, mobile, threat, defense, solutions, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Published By: Sitecore     Published Date: Jun 14, 2017
The Gartner Magic Quadrant for WCM assesses leading solutions and delivers valuable insights for those looking to optimize digital marketing platforms for a better customer experience. The 2015 report evaluates 19 vendors for their Ability to Execute as well as their Completeness of Vision. This year, Sitecore® leapt vertically to the top position for its Ability to Execute among the vendors evaluated and has been in the Leaders quadrant for six consecutive years. Learn more by downloading your copy of the 2015 Gartner Magic Quadrant for WCM now.
Tags : 
profiling, flexible deployment, marketing systems, commerce, email marketing, testing, analytics, omnichannel experience marketing, personalization, cms, wcm
    
Sitecore
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: SAP Hybris     Published Date: Oct 26, 2017
Gartner’s Magic Quadrant for Field Service Management, which evaluates 15 field service management vendors on their completeness of vision and ability to execute
Tags : 
    
SAP Hybris
Published By: Group M_IBM Q1'18     Published Date: Feb 14, 2018
Data science platforms are engines for creating machine-learning solutions. Innovation in this market focuses on cloud, Apache Spark, automation, collaboration and artificial-intelligence capabilities. We evaluate 16 vendors to help you make the best choice for your organization.
Tags : 
gartner, magic quadrant, data science platform, machine-learning
    
Group M_IBM Q1'18
Published By: Oracle     Published Date: Feb 16, 2018
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses. Une étude Gartner récente a révélé que plus de 80 % des directeurs informatiques considèrent le IaaS (Infrastructure as a Service) comme une option viable et que 10 % d’entre eux la considèrent déjà comme le choix par défaut en matière d’infrastructure. L’utilisation d’une infrastructure avec un modèle de services souple de paiement à l’utilisation ne réduit pas seulement les coûts et les problèmes mais elle permet aussi aux services informatiques d’innover de différentes façons, ce qui contribue à stimuler la croissance de l’entreprise.
Tags : 
iaas, les, nuls, concurrentiel, entreprises, oracle
    
Oracle
Published By: Workday UK     Published Date: Mar 08, 2018
Gartner, an independent research firm, published its first-ever Magic Quadrant that evaluates cloud core financial management applications. We’re thrilled to announce that Workday is positioned in the Leaders quadrant in the report “Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises.” Read the report to see what Gartner has to say about us. Learn about its analysis of the market, key recommendations for evaluating vendors, and more.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Mar 26, 2018
Gartner, an independent research firm, published its first-ever Magic Quadrant that evaluates cloud core financial management applications. We’re thrilled to announce that Workday is positioned in the Leaders quadrant in the report “Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises.” Read the report to see what Gartner has to say about us. Learn about its analysis of the market, key recommendations for evaluating vendors, and more. Gartner, Inc., “Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises”; Nigel Rayner, Robert P. Anderson, John E. Van Decker; 19 June 2017. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the ent
Tags : 
    
Workday UK
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.