Enterprise Resource Planning Applications (ERP)

To facilitate information flow, ERP systems employ a software application that integrates internal and external management information across an entire organization and extends to external stakeholders. Research coverage includes ERP applications and services.

Refine your results

Date Range

Methodology

Analyst

Topics

Industry

Region

Vendor

86 results in Reports

  • IT Infrastructure & Operations
  • Security & Risk
  • For Security & Risk Professionals

    Report:Charter A Mobility Council With Seven Tasks

    Stakeholder Needs: The Mobile Security Playbook

    Smartphones, tablets, and the rise of bring-your-own-device (BYOD) programs have put tremendous pressure on IT to revamp and rethink its mobile strategy: everything from procurement and development...

    • Downloads: 980
  • For Security & Risk Professionals

    Report:Address Complexity With Mobile Security And Operations

    Strategic Plan: The Mobile Security Playbook

    This report outlines the strategic vision of Forrester's solution for security and risk (S&R) and infrastructure and operations (I&O) executives leading the development of their firm's mobile...

    • Downloads: 738
  • For Security & Risk Professionals

    Report:Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moments of need. The shift is a global phenomenon that is happening now, not only with...

    • Downloads: 1065
  • For Security & Risk Professionals

    Report:Create New Mobile Operations And Security Professionals

    This report outlines the skills and staffing needs for Forrester's solution for security and risk (S&R) and infrastructure and operations (I&O) executives working on mobile security and operations...

    • Downloads: 602
  • For Security & Risk Professionals

    Report:Survey Employees To Target Mobility Improvements

    This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of budgets,...

    • Downloads: 610
  • For Security & Risk Professionals

    Report:Brief: Insights For S&R Pros From IBM's CIO Leadership Exchange

    The Time Is Now For CISOs To Move From The Back Office To The Front Office

    On March 13, 2014, IBM hosted close to 200 CIOs from North America for a two-day event in Chicago. Discussion focused on the impact that big data, cloud, and new customer engagement models such as...

    • Downloads: 91
  • For Security & Risk Professionals

    Report:The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps

    Benchmark: The Mobile Security Playbook

    Even as more and more firms adopt and grow more comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros remain vigilant — particularly as firms seek to empower...

    • Downloads: 500
  • For Security & Risk Professionals

    Report:Apps Everywhere: Understanding The Need For Mobile Application Management

    Integrate Mobile Application Management Into Your Mobility Strategy

    Proactive IT executives are extending their mobility strategies beyond deploying and managing mobile devices and platforms with primarily corporate email access to include a wide range of mobile...

    • Downloads: 773
  • For Security & Risk Professionals

    Report:It's Time To Level Up Your Mobile Application Security Program

    Introducing Forrester's Mobile Application Security Maturity Model

    Just as security and risk (S&R) professionals are coming to grips with managing personally owned devices in the corporate environment, the risks are moving higher up the stack and into the...

    • Downloads: 320
  • For Security & Risk Professionals

    Report:Develop Mobile Operations And Security Balanced Scorecards

    Performance Management: The Mobile Security Playbook

    This report outlines the performance management of Forrester's solution for infrastructure and operations (I&O) executives working on mobile security and operations. This report is designed to help...

    • Downloads: 532
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 539
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 764
  • For Security & Risk Professionals

    Report:No More Chewy Centers: Introducing The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For a generation of information security professionals,...

    • Downloads: 2027
  • For Security & Risk Professionals

    Report:Market Overview: Content Security, Q3 2011

    SaaS Values Are Established, And Vendors Move Quickly To Capture Market Share

    Content security products enable organizations to protect against email- and web-borne threats, enforce acceptable use policies, and guard against data leak risks. SaaS delivery has been a game...

    • Downloads: 810
  • For Security & Risk Professionals

    Report:Applying Zero Trust To The Extended Enterprise

    Preparing Your Network For Any Device, Anywhere, Any Time

    You are part of an extended enterprise — a new extended ecosystem of customers, clouds, service providers, partners, supply chains, and empowered users. The business expects you, the security...

    • Downloads: 871
  • For Security & Risk Professionals

    Report:Identify, Engage, And Train Mobile Stakeholders

    Change Management: The Mobile Security Playbook

    This report outlines the change management recommendations of Forrester's solution for security and risk (S&R) and infrastructure and operations (I&O) executives working on mobile security and...

    • Downloads: 449
  • For Security & Risk Professionals

    Report:Market Overview: Endpoint Encryption Technologies, Q1 2013

    Protect Your Sensitive Data With Endpoint Encryption

    Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk and...

    • Downloads: 458
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

    When Selecting Security Vendors, Look For Specialized Industry Expertise

    For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

    • Downloads: 66
  • For Security & Risk Professionals

    Report:The CISO's Guide To Virtualization Security

    Get Off The Bench And Look Into Your Virtual Environment

    In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and...

    • Downloads: 1001
  • For Security & Risk Professionals

    Report:Introducing Forrester's Customer IAM Security Maturity Assessment Model

    Gain A Comprehensive View Of The Security Of Your Customer Identity And Authentication Life Cycle

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can't register for or log into your website, mobile app, or phone system, or...

    • Downloads: 202
  • For Security & Risk Professionals

    Report:Endpoint Security Trends, Q2 2013 To Q4 2014

    New Disruptors For Endpoint Security Through 2014

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 446
  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 98
  • For Security & Risk Professionals

    Report:The 15 Most Important Questions To Ask Your Cloud Identity And Access Management Provider

    During the past three years, cloud-based identity and access management (IAM) solutions have become a viable and cost-effective alternative to on-premises, commercial off-the-shelf (COTS), or...

    • Downloads: 513
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy And Procedures: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 585
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1563