survey research

Results 51 - 75 of 113Sort Results By: Published Date | Title | Company Name
Published By: Teradata     Published Date: Feb 26, 2013
This survey and research report discusses shifts in the data management landscape and the movement to align data with operational and analytical workloads creating the best possible unified data architecture platform. Read on to learn more.
Tags : 
big data, survey report, data management, landscape, movement, align data, operational and analytics workloads, business intelligence, terdata, business technology, data center
    
Teradata
Published By: Adobe     Published Date: Oct 24, 2018
The report combines data from a February 2018 executive survey of 401 email marketers and documented ESP demos related to three key themes. We also utilized vendor questionnaires and our near two-decades of knowledge of the providers in this sector. One-on-one phone interviews with several of the marketers who use these tools and our executive survey clients provided satisfaction data. The methodology details our entire recipe, but readers can feel confident in knowing that our vendor evaluation process is objective and does not stem from one analyst’s singular point of view. This guide also includes our analysis and perspective on vendors that did not for a variety of reasons participate in this research.
Tags : 
    
Adobe
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Infoblox     Published Date: Nov 11, 2008
In August 2008, Computerworld invited IT and business leaders to participate in a core network services survey, that included specific questions about their DNS infrastructures and the costs of IP address management. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The survey was commissioned by Infoblox, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Tags : 
network services survey, ip address management, infoblox, dns infrastructures, computerworld research
    
Infoblox
Published By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : 
ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
    
Concur
Published By: CEB     Published Date: Jul 01, 2014
If your organization is representative of trends at large, your workforce is more engaged than ever. But is all that enthusiasm, pride, and willingness being applied in directions that really matter to the company? See why organizations that measure more than just engagement drive real business results.
Tags : 
workforce survey, insight, tools, solutions, enterprise performance, research, it management
    
CEB
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : 
http, web applications, mobile bandwidth, it security standards, mobile performance, security, it management, knowledge management, enterprise applications
    
F5 Networks Inc
Published By: Cisco     Published Date: Jul 11, 2016
To better understand the service dilemma and the role of digitization within the manufacturing industry, Cisco initiated a comprehensive research study. We surveyed more than 600 senior manufacturing decision-makers in 13 countries,* from a range of manufacturingrelated segments, along with conducting qualitative interviews with key industry thought leaders, in-depth secondary research, and economic analysis. To explore the business and organizational implications of connected machines in particular, we surveyed both industrial machine manufacturers and “end-user” manufacturers.
Tags : 
    
Cisco
Published By: MuleSoft     Published Date: Jul 13, 2018
"Digital transformation is increasingly becoming a “when, not an if” for most companies. MuleSoft surveyed 650 IT decision makers across the globe. The research shows that three-quarters of companies are currently undertaking digital transformation initiatives, and 80% say if they don’t complete those initiatives, their companies will lose revenue in the next 12 months. How does your company stack up? Download the Connectivity Benchmark Report 2018 to find out: -The top digital trends companies are investing in for 2018 -The biggest challenges holding companies back from achieving their digital transformation goals -The one strategy companies use to develop applications and projects more efficiently"
Tags : 
    
MuleSoft
Published By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : 
messagelabs symantec, web security threat, malware, bandwidth
    
Symantec.cloud
Published By: iKnowtion     Published Date: Nov 17, 2011
Find out ways to understand the online and offline behavior customers and other impacts associated with this company's online marketing efforts.
Tags : 
customer intelligence, behavioral analysis, customer analytics, channel optimization, iknowtion
    
iKnowtion
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Published By: ITinvolve     Published Date: Apr 16, 2013
The mean-time-to-repair an IT service is a critical measure for most IT organizations, Recent industry survey data from Forrester Research and the itSMF report that IT organizations have made little progress in improving this measure despite its importance to the overall perception of IT operations. The good news is that there is a new approach, built using familiar social collaboration principles, that can help you reduce MTTR by at least 30% without replacing your existing tools. Read this use case document to learn more.
Tags : 
itinvolve, it service, critical measure, it organizations, social collaboration, mttr, itsmf
    
ITinvolve
Published By: HP     Published Date: Sep 02, 2015
Service virtualization enables development and test teams to simulate and model the dependencies of unavailable or limited services and data. Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
analytics software, application management, application performance, cloud applications, cloud virtualization, service virtualization, virtualization, cloud computing, infrastructure
    
HP
Published By: Skillsoft     Published Date: Oct 20, 2015
A global survey of IT leaders at finance organizations, conducted by IDG Research Services, reveals their investments are predominantly reactive despite a desire to remain ahead of the curve.
Tags : 
skillsoft, sumtotal, it leaders, role of it
    
Skillsoft
Published By: IBM     Published Date: Jul 24, 2012
This white paper discusses survey research by breaking it up into a seven step process - and clearly detailing how you can maximize your efforts every step of the way. Get the white paper now.
Tags : 
ibm, technology, data, data collection, data research, analysis, survey, spss, data quality, business technology
    
IBM
Published By: IBM     Published Date: Aug 10, 2012
This brief video shows how advanced analytics can incorporate survey methods designed to help you with every aspect of survey research - everything from gathering the data, to data analysis, to reporting.
Tags : 
survey data, ibm, business analytics, ibm spss, patient satisfaction, analytics solutions, information technology
    
IBM
Published By: Optimizely     Published Date: Dec 01, 2015
In Optimizely’s independent survey of digital channel owners with Dimensional Research, we observed an emerging set of behaviors that indicate sophisticated optimization being done by teams actively running A/B and multivariate experiments. These teams are doubling down on the people and processes needed to accelerate the development of their optimization programs. The result? Faster business benefits and in greater orders of magnitude.
Tags : 
a/b testing, customer experience, sophisticated optimization, optimization programs, enterprise applications
    
Optimizely
Published By: RICOH     Published Date: Sep 19, 2017
The report is based on a survey of 461 senior, Europe-based executives from a wide variety of industries. Their companies include a range of sizes, with 48% having annual incomes of under US$500m, and 10% over US$5bn. The survey sample is senior, with 49% at C-level or above, and a further 23% SVPs, VPs or directors. In addition, The Economist Intelligence Unit conducted seven in depth-interviews with corporate leaders and noted academic experts as well as substantial desk research.
Tags : 
    
RICOH
Published By: Crowd Science     Published Date: Jul 14, 2011
This position paper has been developed to shed some light on the importance of creating a high quality survey questionnaire.
Tags : 
crowd science, scale, audience research, display advertising, targeting, demographics, website demographics, market research, marketing surveys, site satisfaction, audience segment, demographic analysis, online survey, survey research
    
Crowd Science
Published By: CrowdCompass by Cvent     Published Date: Jun 01, 2011
With the right technology, it can be easy to collect customer feedback, improve satisfaction metrics and increase customer retention. But you need to have the right tools.
Tags : 
cvent, web surveys, online surveys, feedback management, feedback software, market research, enterprise feedback management, marketing research, customer voice, voice of the customer, voc, customer experience, customer insights, customer feedback, customer satisfaction, collect feedback, feedback, survey software
    
CrowdCompass by Cvent
Published By: CrowdCompass by Cvent     Published Date: Jun 01, 2011
Surveys that not created using a systematic approach, the results can be inconclusive or irrelevant. These ten tips are designed to help create effective surveys that will deliver meaningful business intelligence.
Tags : 
cvent, web surveys, online surveys, feedback management, enterprise feedback management, create surveys, design surveys, survey design, survey creation, feedback collection, collect feedback, online feedback, customer feedback, customer satisfaction, feedback collection, collect feedback, marketing research, market research
    
CrowdCompass by Cvent
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept