Display search results for ** instead (412 products)

Showing 1-10 of 412

The cloud infrastructure market is highly consolidated, with the top three providers holding nearly 85% of the US market. The market leaders have earned their dominance, with scale, product quality, and continual innovation. They have also hampered competition in the market. And yet, the market continues to support IaaS providers beyond the big 3....

USD 3,000.00

USD 2,250.00 save 25 %

As the pace of business accelerates, a critical question for businesses is how they can afford to spend time training new employees on company systems and processes. Existing employees also present a problem as new technology is rolled out. When a return on investment (ROI) depends on people using the technology successfully and quickly, the differ...

USD 3,000.00

USD 2,250.00 save 25 %

Remote browser isolation is one of those emerging cybersecurity technologies where users actually say, “I really wish I had this before as it rewrites how my organization approaches and manages cyber risk.” In this insight we re-cap the product and market progress of four suppliers of remote browser isolation products: Authentic8, Light Point ...

USD 3,000.00

USD 2,250.00 save 25 %

The business approach of San Francisco-based Identity and Access Management solutions supplier, Okta, can be characterized in a single word: straightforward. Okta’s goal is to enable any organization to connect to any technology it needs in order to be successful. This report looks deeper into the Okta platform and the role it plays in helping ...

USD 3,000.00

USD 2,250.00 save 25 %

In this SPIE, we look at the market need for cloud-based disaster recovery solutions, and clarify service definitions that are sometimes confused in the market. We then examine the Veeam solution, including its capabilities for both enterprises and partners.

USD 3,000.00

USD 2,250.00 save 25 %

This report looks at the reasons why IDaaS is a growing alternative to on-premises, licensed software for many enterprises; how one leading company in the IDaaS market—Santa Clara, California-based Centrify—is delivering on the potential of this new security option; and why enterprises are making the choice to secure access to their corporate s...

USD 3,000.00

USD 2,250.00 save 25 %

Dynamic defenses interact directly with attackers. By dynamically intensifying attacker interactions, dynamic defenses confirm the attacker’s purpose, clarify the threat level of each attacker session, and pragmatically contain the attacker’s activities. Operating in real-time and individually with each attacker session, the interaction and con...

USD 3,000.00

USD 2,250.00 save 25 %

Everyone wants analytic insights to make smarter, faster decisions. But before we reap the benefits of analytics, we must first sow good data. Separating the wheat from the chaff requires effective data preparation: ETL and data mashups, data wrangling, data blending—however you say it or brand it. We assert that, partly as a result of the moun...

USD 3,000.00

USD 2,250.00 save 25 %

Cloud centers (like all data centers) are subject to infrastructure failures. In 2017, most major cloud service providers suffered hours-long outages in some of their services and regions—including AWS, Azure, IBM, Google, Microsoft, and Apple. Enterprises that “click to buy” on-demand cloud services without closely examining the terms and co...

USD 3,000.00

USD 2,250.00 save 25 %

The delivery process for IoT-based solutions is much more than connecting purpose-built devices to the internet. Yet, businesses and consumers focus on the outcomes from device-to-device interconnection, assuming that the appropriate levers of process automation combine adequately and affordably with the right type of connectivity. This report sum...

USD 3,000.00

USD 2,250.00 save 25 %

Showing 1-10 of 412