Enterprise Resource Planning Applications (ERP)

To facilitate information flow, ERP systems employ a software application that integrates internal and external management information across an entire organization and extends to external stakeholders. Research coverage includes ERP applications and services.

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst

87 results in Reports

  • IT Infrastructure & Operations
  • Security & Risk
  • For Security & Risk Professionals

    Report:Five Security Priorities That Asia Pacific Firms Must Address In The Age Of The Customer

    Security and risk (S&R) leaders around the world face difficult challenges in 2014, but unique business and technology trends in Asia Pacific (AP) make some of these challenges more pronounced. For...

    • Downloads: 98
  • For Security & Risk Professionals

    Report:Show Me The Loot!

    Determine The Right Practices For Your Organization's BYOD Stipends

    In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

    • Downloads: 214
  • For Security & Risk Professionals

    Report:Dissect Data To Gain Actionable INTEL

    Forrester's Data Security And Control Framework

    Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

    • Downloads: 412
  • For Security & Risk Professionals

    Report:It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook

    Security and risk (S&R) professionals face many challenges when looking to develop a mobile security strategy that effectively balances the requirements of their digital workforce with the need to...

    • Downloads: 383
  • For Security & Risk Professionals

    Report:Stop The Insanity: If You Don't Exercise Your Business Continuity Plans, You Aren't Prepared

    Ten Recommendations For Maturing Your Business Continuity Exercise Program

    Everyone knows you must exercise your business continuity (BC) plans. However, in dozens of inquiries and consulting engagements with enterprise clients each quarter, Forrester finds that BC managers...

    • Downloads: 335
  • For Security & Risk Professionals

    Report:Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moments of need. The shift is a global phenomenon that is happening now, not only with...

    • Downloads: 1091
  • For Security & Risk Professionals

    Report:Build A Corporate App Store Into Your Corporate Mobility Strategy

    Manage Mobile Complexity Through A Corporate App Store

    Today, many employees use their personally owned smartphones and tablets for work to access a variety of mobile applications. Some companies are also proactively deploying mobile applications to...

    • Downloads: 538
  • For Security & Risk Professionals

    Report:2013 Forrester Mobile Security Predictions

    The mobile market is evolving rapidly. Both the consumer and enterprise markets are experiencing major changes. Room exists for new innovations as well as for established players to develop new...

    • Downloads: 835
  • For Security & Risk Professionals

    Report:The Forrester Cloud Security Compliance Checklist

    In the swift adoption of cloud technology, assessing a cloud provider's security is sometimes an afterthought, an undertaking for which sufficient time and resources don’t exist. But these...

    • Downloads: 107
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2013

    Road Map: The Mobile Security Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

    • Downloads: 625
  • For Security & Risk Professionals

    Report:Navigate The Fragmented Mobile Security Market

    Build/Buy Capabilities: The Mobile Security Playbook

    There is an explosion of both corporate-owned and personally owned mobile devices in the enterprise. Mobility unleashes employee productivity, but it also opens the floodgates for security as well as...

    • Downloads: 2210
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 683
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 907
  • For Security & Risk Professionals

    Report:Address Complexity With Mobile Security And Operations

    Strategic Plan: The Mobile Security Playbook

    This report outlines the strategic vision of Forrester's solution for security and risk (S&R) and infrastructure and operations (I&O) executives leading the development of their firm's mobile...

    • Downloads: 740
  • For Security & Risk Professionals

    Report:Endpoint Security Adoption Trends, Q2 2011 To Q4 2012

    How Your Peers Are Spending For Endpoint Security Through 2012

    Effective protection of user endpoints remains a challenge for enterprises and small and medium-size businesses (SMBs) alike. Trends such as workforce mobility and bring-your-own-device (BYOD)...

    • Downloads: 836
  • For Security & Risk Professionals

    Report:Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...

    • Downloads: 406
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Endpoint Security, Q1 2013

    Endpoint Security Suites Take Center Stage In The Enterprise

    In Forrester's 50 criteria evaluation of endpoint security vendors, we identified nine top providers in the category — F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec,...

    • Downloads: 949
  • For Security & Risk Professionals

    Report:The CISO's Guide To Virtualization Security

    Get Off The Bench And Look Into Your Virtual Environment

    In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and...

    • Downloads: 1002
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Windows 8.1 Security

    According to Forrester's Forrsights Hardware Survey, Q3 2013, 29% of organizations have either deployed or plan to deploy Windows 8 within their traditional endpoint (laptop/desktop) environments. In...

    • Downloads: 134
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 372
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy And Procedures: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 598
  • For Security & Risk Professionals

    Report:BC/DR Remain Priorities For 2012 But Take A Backseat To Cost-Saving And Efficiency Initiatives

    Despite Recent High Profile Disasters, Business Continuity And Disaster Recovery Budgets Stay At Six Percent Of IT Operating And Capital Budgets

    According to our Q2 2010 IT budget survey, 32% of enterprises had planned to increase spending on business continuity and disaster recovery (BC/DR) by at least 5% in 2011. The reality is that...

    • Downloads: 464
  • For Security & Risk Professionals

    Report:Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

    • Downloads: 278
  • For Security & Risk Professionals

    Report:Quick Take: FedRAMP Update Impacts Government Cloud Providers In June 2014

    If you do business with the US federal government or practice security and risk management for an agency, there are changes to the Federal Risk and Authorization Management Program (FedRAMP) baseline...

    • Downloads: 130
  • For Security & Risk Professionals

    Report:Build Security Into Your Network's DNA: The Zero Trust Network Architecture

    Strategic Plan: The Security Architecture And Operations Playbook

    One of our goals with Zero Trust is to optimize the security architectures and technologies for future flexibility. As we move toward a data-centric world with shifting threats and perimeters, we...

    • Downloads: 1989