Enterprise Resource Planning Applications (ERP)

To facilitate information flow, ERP systems employ a software application that integrates internal and external management information across an entire organization and extends to external stakeholders. Research coverage includes ERP applications and services.

Refine your results

Date Range




Market Imperatives




90 results in Reports

  • IT Infrastructure & Operations
  • Security & Risk
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2014

    Road Map: The Mobile Security Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application and data...

    • Downloads: 539
  • For Security & Risk Professionals

    Report:Brief: The Emergence Of The Cloud Security Gateway

    Vendors Aim To Provide S&R Pros With One Consolidated Offering For All Their Cloud Security Requirements

    Vendors are a on a cloud-security buying spree. Microsoft announced its acquisition of cloud access specialist Adallom, and security vendor Blue Coat Systems announced its acquisition of cloud...

    • Downloads: 159
  • For Security & Risk Professionals

    Report:Top Security And Risk Priorities For The Business Technology Agenda

    Tools And Technology: The S&R Practice Playbook

    Digital businesses cannot succeed in today's competitive environment if they don't protect their customers from cybercriminals and fraudsters, safeguard their firm's intellectual property from...

    • Downloads: 351
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 111
  • For Security & Risk Professionals

    Report:Show Me The Loot!

    Determine The Right Practices For Your Organization's BYOD Stipends

    In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

    • Downloads: 236
  • For Security & Risk Professionals

    Report:Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus

    S&R Pros Are Shifting AV Spend To More Proactive Security Technologies

    As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...

    • Downloads: 421
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 489
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To IoT Security

    How The Internet Of Things Will Shatter Traditional Enterprise Security

    The Internet of Things (IoT), or what Forrester refers to as the connected world, combines technologies that enable devices, objects, and infrastructure to interact with monitoring, analytics, and...

    • Downloads: 212
  • For Security & Risk Professionals

    Report:Quick Take: FedRAMP Update Impacts Government Cloud Providers In June 2014

    If you do business with the US federal government or practice security and risk management for an agency, there are changes to the Federal Risk and Authorization Management Program (FedRAMP) baseline...

    • Downloads: 181
  • For Security & Risk Professionals

    Report:Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

    • Downloads: 258
  • For Security & Risk Professionals

    Report:Assess The Maturity Of Your Mobile Security Program

    Assessment: The Mobile Security Playbook

    When developing a mobile security strategy for today's digital business, security and risk (S&R) executives must consider both how they will enable a digital workforce that expects to work anytime...

    • Downloads: 873
  • For Security & Risk Professionals

    Report:Build A Corporate App Store Into Your Corporate Mobility Strategy

    Manage Mobile Complexity Through A Corporate App Store

    Today, many employees use their personally owned smartphones and tablets for work to access a variety of mobile applications. Some companies are also proactively deploying mobile applications to...

    • Downloads: 572
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

    When Selecting Security Vendors, Look For Specialized Industry Expertise

    For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

    • Downloads: 211
  • For Security & Risk Professionals

    Report:The Forrester Cloud Security Compliance Checklist

    In the swift adoption of cloud technology, assessing a cloud provider's security is sometimes an afterthought, an undertaking for which sufficient time and resources don’t exist. But these...

    • Downloads: 134
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Windows 8.1 Security

    According to Forrester's Forrsights Hardware Survey, Q3 2013, 29% of organizations have either deployed or plan to deploy Windows 8 within their traditional endpoint (laptop/desktop) environments. In...

    • Downloads: 156
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1684
  • For Security & Risk Professionals

    Report:Quick Take: Bit9 And Carbon Black Merge

    Bit9 With Carbon Credits Is An Impressive Endpoint Security Play

    On February 13, 2014, Bit9 announced that it had merged with endpoint incident response startup Carbon Black, for an undisclosed amount. Bit9 also announced that it had raised $38.25 million to fuel...

    • Downloads: 124
  • For Security & Risk Professionals

    Report:The State Of Endpoint Security Adoption 2014 To 2015

    Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015

    Every year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 393
  • For Security & Risk Professionals

    Report:Stop Billions In Fraud Losses With Machine Learning

    Machine Learning Is The Only Way To Keep Up With Resourceful Fraudsters Committing Cross-Channel Fraud

    Security and risk (S&R) professionals specializing in fraud find it increasingly difficult to develop new behavioral patterns and models to detect the telltale signs of cybercriminal activity across...

    • Downloads: 299
  • For Security & Risk Professionals

    Report:The State Of Business Continuity 2015: Mission, Priorities, Program Management, And Budgeting

    Part 1: Risk Pros Are Putting The Business Back Into Business Continuity

    As so-called "100-year floods" and cyberattacks grow more frequent, and as governments, healthcare providers, and businesses become completely dependent on complex technology, business continuity...

    • Downloads: 111
  • For Security & Risk Professionals

    Report:Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

    • Downloads: 602
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 559
  • For Security & Risk Professionals

    Report:Master The Mobile Security Landscape

    Landscape: The Mobile Security Playbook

    Many technology management professionals have adopted mobile device management (MDM) technology as the default way to manage and secure ever-growing mobile device counts in the enterprise. However,...

    • Downloads: 290
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The continued adoption of social, mobile, and cloud technologies, together with a multitude of new partnership and customer engagement models, has extended the identity boundary of today's digital...

    • Downloads: 1235
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2012

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We use these inquiries as a barometer to track client challenges and to gauge client interest in the various topics...

    • Downloads: 383