survey research

Results 1 - 25 of 113Sort Results By: Published Date | Title | Company Name
Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection, id theft, employee, ex-employee, ex employee, fraud, employee fraud, actimize, security, database security
    
Actimize
Published By: Adobe     Published Date: Oct 24, 2018
The report combines data from a February 2018 executive survey of 401 email marketers and documented ESP demos related to three key themes. We also utilized vendor questionnaires and our near two-decades of knowledge of the providers in this sector. One-on-one phone interviews with several of the marketers who use these tools and our executive survey clients provided satisfaction data. The methodology details our entire recipe, but readers can feel confident in knowing that our vendor evaluation process is objective and does not stem from one analyst’s singular point of view. This guide also includes our analysis and perspective on vendors that did not for a variety of reasons participate in this research.
Tags : 
    
Adobe
Published By: Ahead     Published Date: Nov 30, 2018
Over the past seven years, we’ve surveyed more than 30,000 technical professionals around the world to explore the relationships between IT performance, DevOps practices, culture, organizational performance and other elements that affect business outcomes. In the process, we’ve built the deepest and most widely referenced body of DevOps research available. The 2018 State of DevOps Report breaks new ground in our understanding of the DevOps evolutionary journey. We have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.
Tags : 
    
Ahead
Published By: Akamai     Published Date: Jul 22, 2010
This slide version of a recorded event delivers key findings of an in-depth consumer survey studying travel Web site functionality and conversion rate satisfaction. Host Margaret Rivera of Akamai and presenter Caroll Rheem, Director of Research at PhoCus Wright, define best practices for fast, reliable travel Web sites.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment
    
Akamai
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management, productivity
    
AppDynamics
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Published By: Attunity     Published Date: Feb 12, 2019
Read this checklist report, with results based on the Eckerson Group’s survey and the Business Application Research Center (BARC), on how companies using the cloud for data warehousing and BI has increased by nearly 50%. BI teams must address multiple issues including data delivery, security, portability and more before moving to the cloud for its infinite scalability and elasticity. Read this report to understand all 7 seven considerations – what, how and why they impact the decision to move to the cloud.
Tags : 
cloud, business intelligence, analytics, cloud data, data lake, data warehouse automation tools, dwa, data warehouse, security and compliance, data movement, hybrid cloud, hybrid cloud environment, cross-platform automation, portability
    
Attunity
Published By: BlackBerry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry, business technology
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
Blackberry
Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism
Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box
Published By: Bronto     Published Date: Jan 20, 2017
Bronto partnered with Ipsos Research and Censuswide to survey more than 4000 US, UK and Australian shoppers about their preferences for cross-border shopping, factors that entice them to shop outside their home country, and remaining barriers to global ecommerce. In this paper we found: - Australian consumers (71%) embrace cross-country commerce more than the UK (44%) and the US (42%). - Women and shoppers over 55 years old are more likely to choose merchants in their home country. - The two top reasons for buying from another country are unique merchandise at a better price. - Barriers include concern about shipping costs, distrust of online payments and security worries. - Download this research report to get more valuable insights and advice to help you be the winner in this growing global competition.
Tags : 
bronto, e-commerce, global sales, customer lifecycle
    
Bronto
Published By: Bronto     Published Date: Feb 01, 2018
We surveyed thousands of consumers in the US, the UK, Australia, Canada and the Netherlands to see how they use mobile technology to interact with retailers. This report details how browsing, product research, comparison shopping and buying have all been transformed by mobile technology. What you'll learn: • Who’s buying via mobile. • How having children in the household affects mobile shopping. • Which customers are most likely to use their phones while shopping in-store.
Tags : 
mobile shopping, mobile, consumer behavior, retail
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
We surveyed thousands of consumers in the US, the UK, Australia, Canada and the Netherlands to see how they use mobile technology to interact with retailers. This report details how browsing, product research, comparison shopping and buying have all been transformed by mobile technology. What you'll learn: • Who’s buying via mobile. • How having children in the household affects mobile shopping. • Which customers are most likely to use their phones while shopping in-store.
Tags : 
customer, consumer, mobile, technology
    
Bronto
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe, database security
    
CA Mainframe
Published By: CA Technologies     Published Date: Jan 08, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: CEB     Published Date: Jul 01, 2014
If your organization is representative of trends at large, your workforce is more engaged than ever. But is all that enthusiasm, pride, and willingness being applied in directions that really matter to the company? See why organizations that measure more than just engagement drive real business results.
Tags : 
workforce survey, insight, tools, solutions, enterprise performance, research, it management
    
CEB
Published By: Cisco     Published Date: Feb 23, 2016
Cisco's Business Cloud Advisor provides a source of comparative cloud adoption levels supported by an IDC research model that integrates benchmarks calculated from the responses of over 3,400 organizations that took part in the IDC CloudView survey and analysis supported by IDC's business outcomes research. This analysis of your responses places You with 31% of the overall organizations in the benchmarked group at cloud adoption level 2 – Opportunistic.
Tags : 
cloud, organization strategies, information technology, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
To better understand the service dilemma and the role of digitization within the manufacturing industry, Cisco initiated a comprehensive research study. We surveyed more than 600 senior manufacturing decision-makers in 13 countries,* from a range of manufacturingrelated segments, along with conducting qualitative interviews with key industry thought leaders, in-depth secondary research, and economic analysis. To explore the business and organizational implications of connected machines in particular, we surveyed both industrial machine manufacturers and “end-user” manufacturers.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Digital transformation has become a top mandate for almost every IT and business leader. The ZK Research 2015 IT Priorities Survey found that 79% of businesses currently have a digital transformation initiative in progress (Exhibit 1). In the digital era, competitive advantage is no longer determined by which company has the best products or even the best people. Market leadership is based on an organization’s ability to analyze information, gain insights and make fast decisions to capitalize on market transitions. One important step in the journey to becoming a digital organization is to transform into an agile business—and it is impossible to do so without having an agile IT infrastructure to enable it. This is why businesses spent more than $12 billion on technology in 2015 to make IT more agile, according to ZK Research.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept