Enterprise Resource Planning Applications (ERP)

To facilitate information flow, ERP systems employ a software application that integrates internal and external management information across an entire organization and extends to external stakeholders. Research coverage includes ERP applications and services.

Refine your results

Date Range







78 results in Reports

  • IT Infrastructure & Operations
  • Security & Risk
  • For Security & Risk Professionals

    Report:The Data Center Services Market In Japan, 2013 To 2016

    Providers Must Address Energy Efficiency And Governance To Thrive

    Over the past 18 months, all of the significant data center players in the Japanese market -- telcos, vendors, service providers, and systems integrators (SIs) -- have been aggressively investing in...

    • Downloads: 193
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Network Access Control, Q2 2011

    ForeScout, Juniper, And Bradford Networks Outdistance The Pack, But Cisco, McAfee, And Enterasys Are Close Behind

    In Forrester's 72-criteria evaluation of network access control (NAC) vendors, we found few notable points of differentiation between vendor offerings. Thus we have a tight clustering of vendors...

    • Downloads: 1068
  • For Security & Risk Professionals

    Report:Endpoint Security Adoption Trends, Q2 2011 To Q4 2012

    How Your Peers Are Spending For Endpoint Security Through 2012

    Effective protection of user endpoints remains a challenge for enterprises and small and medium-size businesses (SMBs) alike. Trends such as workforce mobility and bring-your-own-device (BYOD)...

    • Downloads: 826
  • For Security & Risk Professionals

    Report:The Forrester Cloud Security Compliance Checklist

    In the swift adoption of cloud technology, assessing a cloud provider's security is sometimes an afterthought, an undertaking for which sufficient time and resources don’t exist. But these...

    • Downloads: 87
    • Rating:
  • For Security & Risk Professionals

    Report:Market Overview: Intrusion Prevention Systems, Q2 2011

    A Mature Space, IPS Is Still The Bulwark Of Network Security

    An intrusion prevention system (IPS) complements traditional firewalls by inspecting the entire network packet looking for malicious traffic that is often invisible to Layer 3 firewalls. While...

    • Downloads: 1025
  • For Security & Risk Professionals

    Report:Q&A: Answers To Your Top Questions About Cloud-Based Records Management

    In the wider context of the rapid adoption of a variety of cloud-based applications, enterprise adoption of software-as-a-service (SaaS) or hosted records management (RM) remains limited. While cost,...

    • Downloads: 271
  • For Security & Risk Professionals

    Report:The CISO's Guide To Virtualization Security

    Get Off The Bench And Look Into Your Virtual Environment

    In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and...

    • Downloads: 968
    • Rating:
  • For Security & Risk Professionals

    Report:Japanese Firms Refocus On Business Continuity/Disaster Recovery Post Earthquake

    The Emergence Of Pay-Per-Use Models Increases Business Continuity/Disaster Recovery Adoption Rate

    The devastation of Japan's largest earthquake and tsunami has forced Japanese firms to focus on and invest in business continuity and disaster recovery (BC/DR). Prior to the earthquake, many...

    • Downloads: 174
  • For Security & Risk Professionals

    Report:Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

    • Downloads: 214
    • Rating:
  • For Security & Risk Professionals

    Report:Brief: Insights For S&R Pros From IBM's CIO Leadership Exchange

    The Time Is Now For CISOs To Move From The Back Office To The Front Office

    On March 13, 2014, IBM hosted close to 200 CIOs from North America for a two-day event in Chicago. Discussion focused on the impact that big data, cloud, and new customer engagement models such as...

    • For Security & Risk Professionals

      Report:Quick Take: Bit9 And Carbon Black Merge

      Bit9 With Carbon Credits Is An Impressive Endpoint Security Play

      On February 13, 2014, Bit9 announced that it had merged with endpoint incident response startup Carbon Black, for an undisclosed amount. Bit9 also announced that it had raised $38.25 million to fuel...

      • Downloads: 58
    • For Security & Risk Professionals

      Report:Identify, Engage, And Train Mobile Stakeholders

      Change Management: The Mobile Security And Operations Playbook

      This report outlines the change management recommendations of Forrester's solution for security and risk (S&R) and infrastructure and operations (I&O) executives working on mobile security and...

      • Downloads: 437
    • For Security & Risk Professionals

      Report:Source Your Identity And Access Management Capabilities

      Build/Buy Capabilities: The Identity And Access Management Playbook

      Reducing the costs of an identity and access management (IAM) solution has been a top priority for security and risk professionals for a long time. Although IAM solutions have matured significantly...

      • Downloads: 1028
      • Rating:
    • For Security & Risk Professionals

      Report:The "Venn" Of Federated Identity

      Portable Identity Gives New Options To Companies, Consumers, And Clouds

      Fast-moving cloud and consumer identity trends are driving shifts in how IT professionals control user access and provide personalized service to networked applications. As IT professionals move to...

      • Downloads: 1025
      • Comments: 1
    • For Security & Risk Professionals

      Report:Know Your Data To Create Actionable Policy

      Policy And Procedures: The Data Security And Privacy Playbook

      Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

      • Downloads: 539
      • Rating:
    • For Security & Risk Professionals

      Report:Market Overview: Business Continuity Management Software, Q2 2011

      You Can No Longer Manage A Complex BCM Program With Simple Office Tools

      During 2010 and the early part of 2011, we witnessed a multitude of disruptive natural disasters and extreme weather events, including earthquakes, tsunamis, volcanoes, and blizzards. We also...

      • Downloads: 811
    • For Security & Risk Professionals

      Report:Security's Cloud Revolution Is Upon Us

      Understanding Information Security Amid Major Cloud Disruption

      A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

      • Downloads: 713
      • Rating:
    • For Security & Risk Professionals

      Report:The 2012 Consumer Security Market Landscape: Key Dynamics And Growth Opportunities

      Freeware solutions, device proliferation, consumerization, the app Internet, and new entrants offering adjacent consumer privacy and security offerings have and will continue to change consumer...

      • Downloads: 421
    • For Security & Risk Professionals

      Report:Aim To Empower The Anytime, Anywhere Workforce

      Business Impact: The Mobile Security And Operations Playbook

      With two-thirds of the North American and European workforce reporting that they work outside of their corporate office at least occasionally every month, it's imperative that business leaders...

      • Downloads: 772
    • For Security & Risk Professionals

      Report:Show Me The Loot!

      Determine The Right Practices For Your Organization's BYOD Stipends

      In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

      • Downloads: 199
      • Rating:
    • For Security & Risk Professionals

      Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

      Landscape: The Security Architecture And Operations Playbook

      Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

      • Downloads: 505
      • Rating:
    • For Security & Risk Professionals

      Report:TechRadar™: Enterprise Mobile Security, Q4 2013

      Road Map: The Mobile Security And Operations Playbook

      There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

      • Downloads: 477
      • Comments: 2
    • For Security & Risk Professionals

      Report:Dissect Data To Gain Actionable INTEL

      Forrester's Data Security And Control Framework

      Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

      • Downloads: 394
      • Rating:
    • For Security & Risk Professionals

      Report:The Content Security Forecast Calls For Clouds

      The Benefits Of The SaaS Model Outweigh The Challenges

      As the market for software-as-a-service (SaaS) content security continues to mature, security and risk professionals want to know if it's time for their organization to make the transition to the...

      • Downloads: 694
      • Rating:
    • For Security & Risk Professionals

      Report:Apps Everywhere: Understanding The Need For Mobile Application Management

      Integrate Mobile Application Management Into Your Mobility Strategy

      Proactive IT executives are extending their mobility strategies beyond deploying and managing mobile devices and platforms with primarily corporate email access to include a wide range of mobile...

      • Downloads: 714