respondents

Results 176 - 200 of 229Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM
Published By: Gomez IT     Published Date: May 24, 2011
In a recent global survey of 474 business and IT decision makers, conducted by IDC on behalf of Compuware, respondents offered insights about their needs for effective operation of Internet-enabled business activities.
Tags : 
gomez, compuware, web performance management, idc, slas, service level agreements, end-user experience, multi-device, multi-browser
    
Gomez IT
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
A recent survey by IBM and the Ponemon Institute of more than 2,400 security professionals worldwide turned up some astounding findings: While more than half—53 percent—of respondents said that in the past two years they had suffered at least one data breach, and nearly three quarters—74 percent—said that in the past one year they had faced threats from human error, only 25 percent have an incident management plan in place to address the inevitable. And two thirds—66 percent—lack confidence that their company can effectively recover from an attack.
Tags : 
data breach, security, tips, data threats, attack recovery
    
IBM
Published By: Esker     Published Date: Jul 17, 2018
Read IOFM’s latest AP & P2P white paper on the digital, profitable and strategic future of AP. Accounts payable remains a very paper- and labor-intensive department. Fortunately, the future of AP may be closer than we think. In this insightful white paper, composed of 2018 IOFM survey results from over 200 respondents, readers will better understand the future of AP including answers to questions like: What technologies will be most important to AP’s future? How will AP operate and how will its role change? What challenges will the AP function face? IOFM has the AP insights. Get them here. Download now.
Tags : 
    
Esker
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization, security
    
SilverSky
Published By: Rackspace     Published Date: Feb 13, 2015
700 IT decision makers from organizations with more than 250 employees were interviewed throughout September 2014. Respondents came from an even distribution of sizes/sectors and were from the following countries: US (350), UK (250) and Australia (100). These interviews were conducted online using a rigorous multi-level screening process to ensure only suitable candidates were given the opportunity to participate.
Tags : 
rackspace, devops, operations, development, devops hiring
    
Rackspace
Published By: Cisco     Published Date: Dec 21, 2016
IDC’s 2014 CloudView study interviewed Director-level and above respondents from a global sample of 19,080 enterprise executives responsible for IT decisions. Of this sample the full survey was conducted on the 3,643 respondents actively using cloud for multiple workloads
Tags : 
    
Cisco
Published By: Polycom     Published Date: Aug 16, 2017
"For decade, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment. Download the paper for Five Do’s and Don’ts When Moving from a Premises-Based PBX to Office 365. "
Tags : 
polycom, office 365, cloud, voice, voip
    
Polycom
Published By: ProofHQ     Published Date: Aug 25, 2014
As we have seen the marketing landscape evolve since ProofHQ first started out in 2007, we noticed there are marketing organizations able to manage this change better than others. This has been caused by a constant evolution of digital marketing, an increasing need for cross-channel integration, and an “always on” focus for ROI. High-performing marketing teams are capable of handling more projects, with more collaborators, reacting in real time, across more channels while still meeting deadlines. We set out to learn how they are doing it. To ensure we had a holistic picture, we surveyed individuals with various roles from organizations of all sizes, across various industries, in different geographies. With over 500 respondents we were able to analyze the the similarities and differences amongst teams to give us insights on what leads to high-performing teams. To learn about the results, download now!
Tags : 
proofhq, marketing, agility, digital marketing, roi, integration
    
ProofHQ
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
    
Microsoft Office 365
Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: Cisco     Published Date: Nov 18, 2015
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
cisco, enterprise, mobility, mobile strategy, networking, software development
    
Cisco
Published By: SAS     Published Date: Mar 31, 2016
Analytics is more important to success than ever before, and it’s a business practice that has momentum. Fifty-eight percent of the respondents in a recent survey published in the MIT Sloan Management Review stated that the use of analytics gave their companies a competitive advantage, up from 37 percent the prior year. Enterprise-scale companies report dramatic successes with analytics.
Tags : 
analysis, development management, data management, business intelligence, best practices
    
SAS
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
We are living in the most revolutionary era in human communication since the invention of the printing press. For the past few years, marketers have ‘woken up’ to consumers who have the power to express their views anytime and anywhere. ‘Social’ is hot, and if nothing else, a response to this awakening. Now, the lines between paid, owned and earned media have been blurred, if not erased. Social media crosses the barrier between the three. It’s fast-paced and chaotic. We partnered with the research firm Sentient Services and surveyed more than 200 consumers about their attitudes, opinions and beliefs about brands and social media integration. The respondents come from all over the country, with all different incomes, lifestyles, and social media habits. Universally, the data supports what we’ve already seen in action: consumers want to engage with brands that integrate social media, and they prefer to do business with social brands. Let's get started!
Tags : 
spredfast, social, social integration, paid media, owned media, earned media, social media
    
Spredfast, Inc.
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, marketing analytics, marketing data, crm, customer relationship management, business technology
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, social media marketing, ibm, unica, crm, customer relationship management, top-line marketing strategy, mass-marketing strategy, business technology
    
IBM
Published By: Polycom     Published Date: Dec 18, 2014
Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. Download the full survey report and discover why 85% of our respondents believe video conferencing helps them achieve their business goals, and find out how you can use technology to defy distance within your organization as well.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, global, trends, challenges, collaboration, business technology, telecom
    
Polycom
Published By: Adecco     Published Date: Oct 05, 2017
Use our Salary Guide to adapt as fast as the talent you’re after. Your company will only go as far as your creative and marketing minds take it. They build your unique brand and convince consumers to buy your products and services. But to acquire the best of them, you have to do some convincing of your own—and it starts with salaries. Even with the justified chatter about career paths, culture and work-life balance, salary is still the one. In fact, two thirds of respondents to the recent Workforce 2020 study conducted by Oxford Economics and SAP SE, agree—they all said money matters most. Our Creative & Marketing Salary Guide is the single most important hiring and retention tool for your company. It’ll help you confidently discuss and offer convincing salaries that help you land new talent and keep old talent.
Tags : 
    
Adecco
Published By: Adecco     Published Date: Oct 05, 2017
To hire and retain top talent in today’s ultra competitive job market, you need accurate salary data. As the economy recovers and the unemployment rate declines, job seekers can be more selective—which often means waiting for the right salary. Although benefits, career paths, cultural fit, vacation time and work-life balance still matter, salary remains the most important factor to job seekers. In fact, two thirds of the respondents in Workforce 2020, an Oxford Economics and SAP SE study, said compensation matters most. Our Salary Guide helps you have more informed salary discussions and put together competitive compensation packages—the key to hiring and retaining the best talent.
Tags : 
    
Adecco
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.