Enterprise Resource Planning Applications (ERP)

To facilitate information flow, ERP systems employ a software application that integrates internal and external management information across an entire organization and extends to external stakeholders. Research coverage includes ERP applications and services.

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst

86 results in Reports

  • IT Infrastructure & Operations
  • Security & Risk
  • For Security & Risk Professionals

    Report:Quick Take: Bit9 And Carbon Black Merge

    Bit9 With Carbon Credits Is An Impressive Endpoint Security Play

    On February 13, 2014, Bit9 announced that it had merged with endpoint incident response startup Carbon Black, for an undisclosed amount. Bit9 also announced that it had raised $38.25 million to fuel...

    • Downloads: 113
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 764
  • For Security & Risk Professionals

    Report:Quick Take: S&R Pros Desperate To Ditch BlackBerry Should Rethink Their Strategy

    BlackBerry Finally Opens BB10 OS To Third-Party Management

    On May 13, 2014, BlackBerry announced that it will open to third-party use the application program interface (API) that manages BlackBerry OS 10 devices. By opening the API, BlackBerry is embracing...

    • Downloads: 70
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 762
  • For Security & Risk Professionals

    Report:Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...

    • Downloads: 447
  • For Security & Risk Professionals

    Report:The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps

    Even as more and more firms adopt and grow more comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros remain vigilant — particularly as firms seek to empower...

    • Downloads: 643
  • For Security & Risk Professionals

    Report:Apps Everywhere: Understanding The Need For Mobile Application Management

    Integrate Mobile Application Management Into Your Mobility Strategy

    Proactive IT executives are extending their mobility strategies beyond deploying and managing mobile devices and platforms with primarily corporate email access to include a wide range of mobile...

    • Downloads: 832
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Endpoint Security, Q1 2013

    Endpoint Security Suites Take Center Stage In The Enterprise

    In Forrester's 50 criteria evaluation of endpoint security vendors, we identified nine top providers in the category — F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec,...

    • Downloads: 1014
  • For Security & Risk Professionals

    Report:Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus

    S&R Pros Are Shifting AV Spend To More Proactive Security Technologies

    As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...

    • Downloads: 366
  • For Security & Risk Professionals

    Report:Enable Mobile Engagement Through A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook

    This report outlines the skills and staffing needs for Forrester's solution for security and risk (S&R) executives working on mobile security strategy. We designed this report to help S&R executives...

    • Downloads: 211
  • For Security & Risk Professionals

    Report:Quick Take: Pulse Secure Spins Off, Immediately Acquires MobileSpaces

    Good News For S&R Pros Seeking A Unified Solution For Mobile Device, App, And Data Security

    On October 2, 2014 Juniper Networks divested Junos Pulse, a secure gateway and VPN offering, into a new entity, Pulse Secure, which simultaneously announced the acquisition of mobile application...

    • Downloads: 45
  • For Security & Risk Professionals

    Report:Unmasking Consumer Privacy Tools

    Uses, Benefits, And Implications For S&R Pros

    Consumerization is alive and well, and today's engaged tech-savvy employees will bring in tools and services of their choosing to help them do their jobs better and more efficiently. This includes a...

    • Downloads: 131
  • For Security & Risk Professionals

    Report:AWS Cloud Security

    AWS Takes Important Steps For Securing Cloud Workloads

    Security to and from the cloud is a hot topic. The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1...

    • Downloads: 698
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 101
  • For Security & Risk Professionals

    Report:2013 Forrester Mobile Security Predictions

    The mobile market is evolving rapidly. Both the consumer and enterprise markets are experiencing major changes. Room exists for new innovations as well as for established players to develop new...

    • Downloads: 858
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 879
  • For Security & Risk Professionals

    Report:Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

    Landscape: The Identity and Access Management Playbook

    As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

    • Downloads: 441
  • For Security & Risk Professionals

    Report:Application Control: An Essential Endpoint Security Component

    It's no mystery that antivirus (AV) technologies are fighting a losing battle against an increasingly sophisticated malware threat landscape. Attackers often penetrate user endpoints with new malware...

    • Downloads: 431
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    Road Map: The Security Architecture And Operations Playbook

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

    • Downloads: 356
  • For Security & Risk Professionals

    Report:Benchmarking Your Enterprise Mobile Device Operations Initiatives And Plans

    This report provides insight into corporate mobility adoption trends based on results from Forrester's Forrsights surveys of IT mobility decision-makers and end user workers in North American and...

    • Downloads: 601
  • For Security & Risk Professionals

    Report:Show Me The Loot!

    Determine The Right Practices For Your Organization's BYOD Stipends

    In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

    • Downloads: 226
  • For Security & Risk Professionals

    Report:Quick Take: Android For Work Upends Multiple Markets

    On February 25, 2015, Google publicly announced its latest functionality updates to the Android OS, titled "Android for Work" (AFW). The efficiency and security improvements delivered by AFW will...

    • Downloads: 104
  • For Security & Risk Professionals

    Report:Quick Take: Google Acquires Divide And Shakes Up The Mobile Security Landscape

    On May 19, 2014, Google announced the acquisition of mobile device management and security vendor Divide. Divide's primary product offering creates two separate personas on a mobile device....

    • Downloads: 155
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 855
  • For Security & Risk Professionals

    Report:Use Commercial IAM Solutions To Achieve More Than 100% ROI Over Manual Processes

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage access to sensitive applications and data without inhibiting business agility, compromising...

    • Downloads: 848