Skip to content
 

vendor analysis

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega
Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement
    
Pega
Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management
    
Pega
Published By: EMC Corporation     Published Date: Dec 19, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis
    
EMC Corporation
Published By: Possible EMC     Published Date: Dec 22, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis
    
Possible EMC
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations are now responsible for delivering seamless customer experiences while preventing outages and managing an increasing number of systems. With growing responsibility placed on IT, there is an opportunity to drive strategy for company-wide business processes and operations. Companies using machine data powered platforms like Splunk collect disparate data types to quickly troubleshoot and monitor systems. By adding predictive capabilities, IT can glean critical insights for the business and develop strategic initiatives on issues that matter. Download the white paper “Embracing the Strategic Opportunity of IT” to learn how to: Enable a business aware IT organization Unlock operational efficiencies Solve problems with predictive analytics
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
The world of artificial intelligence (AI) has finally arrived at the doorstep of IT operations. As organizations move toward using both big data and machine learning functionality to support a variety of IT operations, processes and tasks, artificial intelligence for IT operations (AIOps) platforms have emerged as a one-stop solution. Gartner has released a “Market Guide for AIOps Platforms” that provides findings about the AIOps industry and its latest developments. Download your complimentary copy to: *Gain insight into the developing industry of AIOps and its future *Learn how to optimize IT operations powered by machine learning to drive business value *Compare different AIOps platform vendors and their range of capabilities
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: EMC Corporation     Published Date: Feb 13, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
all-flash-array, enterprise storage systems, flash storage, market-level analysis, hybrid flash array
    
EMC Corporation
Published By: Dell EMC     Published Date: May 15, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
emc, storage all-flash, architectures, workload, data center, scale, storage, hybrid, vendor profiles
    
Dell EMC
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
    
AppDynamics
Published By: BMC ESM     Published Date: Nov 09, 2009
Gartner assesses the vendor landscape in their latest Magic Quadrant for IT Event Correlation and Analysis, and positions BMC in the Leaders' Quadrant. Read the report
Tags : 
bmc esm, magic quadrant, consolidation, eca, event correlation and analysis, business service management, event management, deduplication
    
BMC ESM
Published By: OpTier     Published Date: Sep 28, 2012
Ovum takes a representative group, across new to established leading vendors and provides a SWOT analysis of their solutions, and conducted a comprehensive features assessment with the results summarized in the Ovum APM Rainbow Map.
Tags : 
application performance management, apm, ovum, end-user experience monitoring, euem, apm solutions
    
OpTier
Published By: Optymyze     Published Date: Feb 05, 2018
Optymyze jumps to a new high in the 2018 Gartner Magic Quadrant for Sales Performance Management. Named a Leader for the third consecutive year, Optymyze distinguished itself through agile operations, a strong business model, and excellent market execution. Gartner Research, the world’s leading research and advisory firm, also recognized our efforts to deliver innovative solutions and respond to client and market needs. This objective vendor comparison from Gartner is a must-read for any company considering an SPM solution. Access the full 2018 report! • Practical guidance on evaluating SPM solutions • An in-depth review of Optymyze and 10 other vendors • Analysis of SPM vendor capabilities and industry trends. Get instant access to the full 2018 Gartner research report!
Tags : 
2018 gartner magic quadrant for spm, gartner magic quadrant for spm, sales performance management, spm, sales team performance, sales operations, sales representative performance, spm vendors, incentive compensation
    
Optymyze
Published By: Oracle     Published Date: Apr 03, 2012
This IDC study uses the IDC MarketScape model to assess capabilities of vendors to support complex process improvement scenarios using BPM software.
Tags : 
3-6245825015
    
Oracle
Published By: MuleSoft     Published Date: Apr 17, 2017
MuleSoft Positioned as a Leader 4 Years in a Row Read this complimentary copy of the 2017 Gartner Magic Quadrant for iPaaS, and find out why MuleSoft was named a Leader based on completeness of vision and the ability to execute. Read on to learn: Expert perspectives on the iPaaS vendor landscape Critical analysis of key differentiators Latest developments in integration technology Industry benchmarks and trends
Tags : 
mulesoft, leader, industry benchmarks, gartner magic quadrant
    
MuleSoft
Published By: Cisco     Published Date: Apr 08, 2014
Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Tags : 
cisco, malware detection, malware threats, security, cloud computing, swg vendors
    
Cisco
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
    
Aruba Networks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing
    
Intralinks
Previous   1 2    Next    
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.