Display search results for ** instead (886 products)

Showing 1-10 of 886

The cloud infrastructure market is highly consolidated, with the top three providers holding nearly 85% of the US market. The market leaders have earned their dominance, with scale, product quality, and continual innovation. They have also hampered competition in the market. And yet, the market continues to support IaaS providers beyond the big 3....

USD 3,000.00

USD 2,250.00 save 25 %

The automated, programmatic generation of telephone calls, “robocalls,” is an increasing threat that targets both fixed-line and mobile network customers. Robocall misuse is escalating despite control measures enacted by regulatory edicts, apps for mobile devices designed to filter such calls, and consumer complaints. In 2017, robocall complain...

USD 3,000.00

USD 2,250.00 save 25 %

As the pace of business accelerates, a critical question for businesses is how they can afford to spend time training new employees on company systems and processes. Existing employees also present a problem as new technology is rolled out. When a return on investment (ROI) depends on people using the technology successfully and quickly, the differ...

USD 3,000.00

USD 2,250.00 save 25 %

Remote browser isolation is one of those emerging cybersecurity technologies where users actually say, “I really wish I had this before as it rewrites how my organization approaches and manages cyber risk.” In this insight we re-cap the product and market progress of four suppliers of remote browser isolation products: Authentic8, Light Point ...

USD 3,000.00

USD 2,250.00 save 25 %

The data management industry has made rapid advancements in storing massive amounts of data—but if it does not also give users the ability to perform data preparation at scale, the analytic insights their organizations are thirsting for will fail to materialize. What organizations need is to equip their business users with self-service data prep...

USD 3,000.00

USD 2,250.00 save 25 %

This insight provides an overview of GDPR, as companies that need to comply should by now be well aware of its implications. In addition, the report focuses on why it is best for companies to view this regulation less as a restriction on data usage, or a curtailing of legitimate customer relationship management (CRM) practices, as some companies do...

USD 3,000.00

USD 2,250.00 save 25 %

The business approach of San Francisco-based Identity and Access Management solutions supplier, Okta, can be characterized in a single word: straightforward. Okta’s goal is to enable any organization to connect to any technology it needs in order to be successful. This report looks deeper into the Okta platform and the role it plays in helping ...

USD 3,000.00

USD 2,250.00 save 25 %

In this SPIE, we look at the market need for cloud-based disaster recovery solutions, and clarify service definitions that are sometimes confused in the market. We then examine the Veeam solution, including its capabilities for both enterprises and partners.

USD 3,000.00

USD 2,250.00 save 25 %

The day of reckoning is fast approaching. On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. The European Union (EU) regulation, known as (EU) 2016/679, provides data protection and privacy for all individuals in the EU. GDPR is a law covering all EU member countries, which includes enforcement with fines and/or san...

USD 3,000.00

USD 2,250.00 save 25 %

This report looks at the reasons why IDaaS is a growing alternative to on-premises, licensed software for many enterprises; how one leading company in the IDaaS market—Santa Clara, California-based Centrify—is delivering on the potential of this new security option; and why enterprises are making the choice to secure access to their corporate s...

USD 3,000.00

USD 2,250.00 save 25 %

Showing 1-10 of 886