Display search results for ** instead (19 products)
22 Dec 2014  |  North America
More than just NAC
In 2013, network access control (NAC) entered a hot market stage. Frost & Sullivan estimates that NAC global revenues grew 40.5% year-over-year. Continuing strong demand for NAC functionality is expected over the next five years. The primary reason is that NAC is an essential last line of defense against cyber-attackers that see network-connectin...
11 Dec 2014  |  North America
The total number of North American residential broadband subscribers grew by 330,000 in 3Q 2014, to a total of nearly 104.7 million. Compared to 3Q 2013, total subscriber numbers increased by 3.9% in the US, and by 3.5% in Canada.
09 Oct 2014  |  North America
Technology-enabled BPO Solutions to Drive Growth
This market analysis study provides market sizing and forecasts for the North American contact center outsourcing market. North American market revenue represents outsourcer revenues associated with customer interactions that originate in North America, regardless of fulfillment model. This includes onshore, nearshore, offshore, home-agent, automat...
09 Jul 2014  |  North America
Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions
Threat actors use DDoS attacks to block access to targeted websites for legitimate users. These attacks are becoming increasingly disruptive, frequent, and sophisticated. As a result, businesses require purpose-built solutions to detect and block the full array of DDoS attacks. Demand for DDoS mitigation solutions is growing, but the market faces a...
09 Jul 2014  |  North America
APTs Drive New Service Opportunities
This report provides an analysis of the market for the North American managed security services market. These network security services include some degree of proactive monitoring of the customers security environment, and may encompass protection against denial of service attacks, email viruses/worms, spam, and other various cyber maladies. This ...
03 Jul 2014  |  North America
Poised to Exceed $2 Billion in Revenues in 2014
This market analysis research provides market sizing and forecasts for hosted contact center services. This includes public cloud services as well as dedicated hosted solutions. The segments covered are: hosted IVR, hosted ACD, hosted customer chat, hosted outbound contact, and hosted agent performance optimization (APO) applications. The study als...
26 Jun 2014  |  North America
Growth Slows Down as Companies Migrate to Cloud Solutions
This market analysis research provides market sizing and forecasts for premises-based contact center systems. The product segments covered are: inbound contact routing, IVR and voice portal, outbound dialer, quality monitoring, workforce management, and contact center analytics. The study provides market forecasts by product segment, industry verti...
10 Mar 2014  |  North America
Flexible Products Deliver Superior Protection and Customer Value
IT organizations today are challenged, more than ever, to secure valuable data and intellectual property from relentless hackers and threat actors. The network firewall is one important tool in a network security architecture. However, in recent years, firewalls have become ineffective against new hacking techniques. The advent of the unified threa...
17 Jan 2014  |  North America
Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology
This research service provides insight into the vulnerability management market, which provides products that scan enterprise network infrastructure and identify and prioritize critical security issues so customers can address them. This global and regional market analysis includes forecasts for 2014-2018. The report details what the leading vulner...
16 Jan 2014  |  North America
Market Blossoms from Cyber-Driven Demand
Authentication establishes a bond of trust between an organization and the user who is requesting system access. Strong authentication refers to methods of authenticating users with a level of validation that is beyond that of simple username and password. The methods of strong authentication addressed in this report include Hardware One-Time Pass...