Find An Analyst


Name Coverage Area
Yamada,Kiyomi Servers & Storage
Yamaji,Masatsune Semiconductors
Yamanoi,Satoshi Outsourcing & IT Services
Yau,Tsz Wai Servers & Storage - Comparative Hardware
Yeates,Morgan Outsourcing & IT Services
Yim,Jin-Sik Servers & Storage
Young,Allie Outsourcing & IT Services
Young,Colleen M. IT Management
Young,Danellie Networking & Communications Equipment
Networking & Communications Services
Young,Greg Security & Privacy
Yuen,Daniel Business Intelligence

Become a Client

Call us now at:

+1-800-213-4848 Or
Contact us Online


  • 9 March 2018

    2018 CIO Agenda: An Australia and New Zealand Perspective CIOs in Australia and New Zealand continue to lag behind global digital leaders in technology investment, innovation and capability — a trend we saw in 2017. This year, CIOs need to be bold and take advantage of unfolding digital business opportunities and defending continued disruption and threats.
  • 28 February 2018

    It's Time for App Leadership to Reframe Mobile App Development Decisions The landscape of available tools and technologies for mobile app development is expanding to support multiple experience app development. Application leaders need to reframe mobile app development as a cornerstone that can lead to optimized user experience on multiple channels and touchpoints.


  • 26 Mar 2018

    Digital Business Impact on Leadership, Talent, Organizations and Culture EDT: 9:00 a.m. | PDT: 6:00 a.m. | GMT: 14:00 Our business models are under attack by digital transformation. The CIO holds a unique view on how to withstand the attack and guide the organization to victory. So how do we get there, and who does the CIO need as allies? Join us as we discuss the impact of digital business on leadership, talent, organizations and their culture and how to successfully guide and engage your employees amidst change.
  • 26 Mar 2018

    Apply Deception Techniques to Detect Security Threats EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 16:00 As organizations struggle to deal with the evolving security threat landscape, there has been a resurgence in interest on deception techniques. Simple honeypots have evolved into distributed deception platforms and existing security solutions have also started to include deception components. This webinar focuses on using deception as a "low-friction" method to detect lateral threat movement and as an alternative or a complement to other detection technologies.