cio report

Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'20     Published Date: Mar 23, 2020
Enterprise insight platforms help CIOs address the continual business demand to go faster in the face of technology complexity. The Forrester Wave™: Enterprise Insight Platforms, Q1 2019 report provides an analysis of the nine most significant providers to help CIOs make the right choice when selecting a platform vendor. Read the paper to: 1. Learn how nine key providers stack up against a 21-criterion evaluation - EdgeVerve, GoodData, Google, IBM, Microsoft, Reltio, SAP, SAS, and TIBCO Software. 2. Discover the key differentiators that enable hybrid cloud and multicloud delivery.
Tags : 
    
Group M_IBM Q2'20
Published By: Workday     Published Date: Apr 24, 2020
"Today’s CIOs must apply new ways of thinking to the changing world of finance. We believe this Gartner report explores why ERP applications are evolving to become more open and flexible, and how companies can benefit from a new generation of applications, architectures, and technologies. Gartner, ERP’s Emerging Fourth Era — Moving Beyond Postmodern ERP; Denise Ganly, Mike Guay, Paul Saunders, Tim Faith GARTNER is a registered trademark and service mark of Gartner, Inc. and/or"
Tags : 
    
Workday
Published By: Lenovo     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. ¿Sabías que se necesitan 23 días de media para recuperarse de un ataque de ransomware1? Averigua por qué la seguridad informática es lo más importante, y punto. Descarga nuestra guía de soluciones > 1 IBM: 2017 Global CODB Report Final (en inglés) v
Tags : 
    
Lenovo
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of financial services customers at risk. Despite massive amounts of effort poured into awareness campaigns, phishing still remains a top threat to financial services organizations including: • 50% of all the unique organizations impersonated by tracked phishing domains were from the financial services sector. • 6% of global malicious login attempts targeted the financial • Financial services industry accounted for 14% of all unique targets between 2017 to April, 2019 Read the 2019 State of the Internet / Security Financial Services Attack Economy Report to learn about lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Cisco     Published Date: Jul 30, 2015
Enabling the Internet of Everything.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat, which highlights the industry move to OpenStack and benefits of moving to OpenStack cloud technology, wherein companies see promise and a need for implementation expertise.
Tags : 
quickpulse, red hat, open stack, infrastructure, infrastructure as a service, isas, workload, cloud, virtulization, data center
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Tags : 
red hat, virtualization, storage, cloud, cloud data, hybrid cloud, cloud management, platform as a service, paas, cloud data access storage, cloud applications, scalability, deployment, cloud technologies, it management, platforms
    
Red Hat
Published By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : 
insights, technology, cios
    
IBM APAC
Published By: Secure Code Warrior     Published Date: Mar 10, 2020
As more businesses move to agile methodologies, providing more online services to customers and exposing data and APIs, the need for “Shifting Left” and building security into the start of the (continuous) development cycle grows every day. CIOs and CISOs need to think carefully about when, where and how to deploy a security uplift program to maximize business impact and not overload the core function of the developers. In this e-book , we share six steps companies should take before deploying a program, based on our learnings from more than fifty enterprise deployments. These steps will help you get he strategy, data and processes in place to drive success. Download this report now.
Tags : 
    
Secure Code Warrior
Published By: VMware     Published Date: Mar 12, 2020
With more choice and purchasing power than ever before, customer experience has become everything. For CIOs, this means leveraging technology to win, serve, and retain customers year over year. It also means that end customer experience (CX), both internal and consumer - facing, can either be enriched or degraded by the quality and performance of software applications. For enterprise companies, their business now and in the future will depend on how effective, easy, and meaningful that application experience is -- a critical juncture as CIOs take over more responsibility for revenue generation and innovation. In October 2019, Forrester, in conjunction with VMware, surveyed more than 650 enterprise CIOs and technology SVPs throughout North America, Europe, and Asia - Pacific on the impact of applications on today's customer experience. Those findings have been distilled into a robust, data - driven report with insights and analysis on what's holding enterprise companies from improving t
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 16, 2020
The CIO's world is changing fast. In five years, chief information officers (CIOs) will have new responsibilities in the C-suite and across the enterprise, extending their strategic influence over product development, marketing, human resources, the supply chain and more. They will be challenged to discover new ways of generating revenue and to introduce artificial intelligence and machine learning capabilities that create unparalleled efficiencies. Such are some of the findings of a global Forbes Insights survey, conducted in partnership with VMware, of more than 650 CIOs in North America, Europe and the Asia-Pacific region (including Japan). The surveyed CIOs are from broad range of industries, including financial services, healthcare, government, manufacturing, retail and telecommunications. They work for organizations with annual revenue of $1 billion or more; 16% were from firms with at least $10 billion in revenue. Based on the survey findings, this report examines six critical d
Tags : 
    
VMware
Published By: Vmware     Published Date: Mar 17, 2020
The average tenure of a CIO in large organizations is short and it’s a challenge to make significant impact during that time. What can CIOs expect to accomplish in that period of time and what challenges do they face in that effort? How can CIOs create a roadmap that identifies the key business transformation opportunities that will create lasting value, what legacy challenges exist and what organizational hurdles are there to overcome? This IDC Spotlight report explores how technology leaders can create and execute that roadmap in order to be real change agents.?
Tags : 
    
Vmware
Published By: Vmware     Published Date: Mar 17, 2020
The CIO's world is changing fast. In five years, chief information officers (CIOs) will have new responsibilities in the C-suite and across the enterprise, extending their strategic influence over product development, marketing, human resources, the supply chain and more. They will be challenged to discover new ways of generating revenue and to introduce artificial intelligence and machine learning capabilities that create unparalleled efficiencies. Such are some of the findings of a global Forbes Insights survey, conducted in partnership with VMware, of more than 650 CIOs in North America, Europe and the Asia-Pacific region (including Japan). The surveyed CIOs are from broad range of industries, including financial services, healthcare, government, manufacturing, retail and telecommunications. They work for organizations with annual revenue of $1 billion or more; 16% were from firms with at least $10 billion in revenue. Based on the survey findings, this report examines six critical d
Tags : 
    
Vmware
Published By: Vmware     Published Date: Mar 17, 2020
By 2025, 49 percent of today’s CIOs expect to become CEOs. How? By taking ownership over more parts of the business, from revenue generation to product and service innovation. This VMware Executive Perspective casts a wide-angle view of the critical traits and skills needed to achieve enterprise trust, influence, and impact across four key dimensions. How do your efforts stack up and help or hinder your career trajectory?
Tags : 
    
Vmware
Published By: Vmware     Published Date: Mar 17, 2020
With more choice and purchasing power than ever before, customer experience has become everything. For CIOs, this means leveraging technology to win, serve, and retain customers year over year. It also means that end customer experience (CX), both internal and consumer-facing, can either be enriched or degraded by the quality and performance of software applications. For enterprise companies, their business now and in the future will depend on how effective, easy, and meaningful that application experience is--a critical juncture as CIOs take over more responsibility for revenue generation and innovation. In October 2019, Forrester, in conjunction with VMware, surveyed more than 650 enterprise CIOs and technology SVPs throughout North America, Europe, and Asia-Pacific on the impact of applications on today's customer experience. Those findings have been distilled into a robust, data-driven report with insights and analysis on what's holding enterprise companies from improving the end-
Tags : 
    
Vmware
Published By: New Relic     Published Date: Apr 07, 2015
It’s all too easy for CIOs and technology management to build a strategy around any new technology area that is focused on delivering lower technology costs and greater operational efficiency. However, to get your cloud strategy right, you have to learn to move away from measuring the success of change against technology management care-abouts and focus on the priorities of the business. Forrester’s Business Technographics® surveys show a stark disconnect between technology management’s and the business’ desired outcomes from cloud computing; embracing the shift to cloud services means driving and measuring its success against metrics defined by the business before those of IT. This report outlines the strategic plan of Forrester’s solution for CIOs working on cloud computing. This report is designed to help you onboard the business to your cloud strategy.
Tags : 
    
New Relic
Published By: Workday UK     Published Date: Jan 31, 2020
"Align data and analytics with your digital strategy. Successfully incorporating data and analytics (D&A) into your digital strategy can be a struggle. If D&A investments seem to fall short of expected results and you're having trouble knowing which investments to make, you're not alone. CIOs and CDOs will have to make data-driven decisions to create efficient D&A platforms. This report from Gartner can help. Read it to learn how you can: • Use decision-making models to choose D&A investments • Collaborate with digital business stakeholders • Identify your organisation's data and analytics needs"
Tags : 
    
Workday UK
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: Workday     Published Date: Dec 19, 2019
Align data and analytics with your digital strategy. Successfully incorporating data and analytics (D&A) into your digital strategy can be a struggle. If D&A investments seem to fall short of expected results and you’re having trouble knowing which investments to make, you’re not alone. CIOs and CDOs will have to make data-driven decisions to create efficient D&A platforms. This report from Gartner can help. Read it to learn how you can: Use decision-making models to choose D&A investments Collaborate with digital business stakeholders Identify your organization’s data and analytics needs
Tags : 
    
Workday
Published By: Workday Nordics     Published Date: Feb 11, 2020
"Align data and analytics with your digital strategy. Successfully incorporating data and analytics (D&A) into your digital strategy can be a struggle. If D&A investments seem to fall short of expected results and you're having trouble knowing which investments to make, you're not alone. CIOs and CDOs will have to make data-driven decisions to create efficient D&A platforms. This report from Gartner can help. Read it to learn how you can: • Use decision-making models to choose D&A investments • Collaborate with digital business stakeholders • Identify your organisation's data and analytics needs"
Tags : 
    
Workday Nordics
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.