62 Search Results

Filters |

  • Overview: Cloud-Enabling Technologies

    This Market Monitor Cloud-Enabling Technologies report provides updated market and vendor estimates through Q2 2017. Cloud-Enabling Technologies (CET) encompass the vital support system for a cloud environment, which includes the automation and management stack. It is our position that server virtualization itself is an enabler for cloud computing. In addition, what the broader industry terms ‘private clouds’ fall under the purview of our CET definition because this technology is installed, delivered and consumed on-premises, and is not hosted by a third party. However, the CET tools included in this analysis are commonly leveraged by cloud providers to create the cloud environments they offer as a service. The Q3 update includes a breakout of the emerging container marketplace and incorporates the private PaaS vendors as part of our platform analysis.

    Cloud Transformation Systems & Software Infrastructure

  • Voice of the Enterprise: Information Security, Workloads and Key Projects - Quarterly Customer Narratives

    The Voice of the Enterprise: Information Security, Workloads and Key Projects survey was conducted during April and May 2017. The Quarterly Customer Narratives provide a detailed tracker of customer feedback from 18 in-depth telephone interviews with end users, segmented by respondent, company size, vendor(s) used and theme (360-quote Excel report). The survey represents approximately 650 completed surveys and 18 hour-long interviews from pre-qualified IT decision-makers primarily based in North America, Europe and Asia. In addition to regular quarterly topics, this survey focuses on key information security projects for 2017, as well as a review of endpoint security deployments.

    Information Security

  • Voice of the Enterprise: Information Security, Workloads and Key Projects - Regional and Worldwide Crosstabs

    The Voice of the Enterprise: Information Security, Workloads and Key Projects survey was conducted during April and May 2017. The quarterly Excel Crosstab contains complete worldwide and regional survey results, including key metrics and segmentations. The survey represents approximately 650 completed surveys and 18 hour-long interviews from pre-qualified IT decision-makers primarily based in North America, Europe and Asia. In addition to regular quarterly topics, this survey focuses on key information security projects for 2017, as well as a review of endpoint security deployments.

    Information Security

  • Voice of the Enterprise: Information Security, Workloads and Key Projects - Quarterly Worldwide Crosstabs

    The Voice of the Enterprise: Information Security, Workloads and Key Projects survey was conducted during April and May 2017. The quarterly Excel Crosstab contains complete worldwide survey results, including key metrics and segmentations. The survey represents approximately 650 completed surveys and 18 hour-long interviews from pre-qualified IT decision-makers primarily based in North America, Europe and Asia. In addition to regular quarterly topics, this survey focuses on key information security projects for 2017, as well as a review of endpoint security deployments.

    Information Security

  • Voice of the Enterprise: Information Security, Workloads and Key Projects - Quarterly Survey Questionnaire

    The Voice of the Enterprise: Information Security, Workloads and Key Projects survey was conducted during April and May 2017. The questionnaire includes a complete copy of questions asked in the quarterly survey. The survey represents approximately 650 completed surveys and 18 hour-long interviews from pre-qualified IT decision-makers primarily based in North America, Europe and Asia. In addition to regular quarterly topics, this survey focuses on key information security projects for 2017, as well as a review of endpoint security deployments.

    Information Security

  • Voice of the Enterprise: Information Security, Workloads and Key Projects - Quarterly PowerPoint Charts and Figures

    The Voice of the Enterprise: Information Security, Workloads and Key Projects PowerPoint deck includes charts and figures from the results of our quarterly survey of approximately 650 pre-qualified IT decision-makers primarily based in North America, Europe and Asia. The survey was conducted during April and May 2017. In addition to regular quarterly topics, this survey focuses on key information security projects for 2017, as well as a review of endpoint security deployments.

    Information Security

  • Cloud-Enabling Technologies

    This Market Monitor Cloud-Enabling Technologies report provides updated market and vendor estimates through Q1 2017. Cloud-Enabling Technologies (CET) encompass the vital support system for a cloud environment, which includes the automation and management stack. It is our position that server virtualization itself is an enabler for cloud computing. In addition, what the broader industry terms 'private clouds' fall under the purview of our CET definition because this technology is installed, delivered and consumed on-premises, and is not hosted by a third party. However, the CET tools included in this analysis are commonly leveraged by cloud providers to create the cloud environments they offer as a service. The Q3 update includes a breakout of the emerging container marketplace and incorporates the private PaaS vendors as part of our platform analysis.

    Cloud Transformation Systems & Software Infrastructure

  • Cloud-Enabling Technologies

    This Market Monitor Cloud-Enabling Technologies report provides updated market and vendor estimates through Q4 2016. Cloud-Enabling Technologies (CET) encompass the vital support system for a cloud environment, which includes the automation and management stack. It is our position that server virtualization is an enabler for cloud computing. In addition, what the broader industry terms 'private clouds' fall under the purview of our CET definition because this technology is installed, delivered and consumed on-premises, and is not hosted by a third party. However, the CET tools included in this analysis are commonly leveraged by cloud providers to create the cloud environments they offer as a service.

    Cloud Transformation Systems & Software Infrastructure

New Alert Set

"My Alert"

Failed to Set Alert

"My Alert"