it monitoring

Results 1 - 25 of 713Sort Results By: Published Date | Title | Company Name

Managing pump station assets for lowest TCO and maximum effectiveness

Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how digital technology is integrating real-time monitoring of pump energy usage, maintenance, and operations for maximum payback.
Tags : 
pump, tco, water
    
Schneider Electric

Reduce Complexity in the Data Center with the Right Architecture

Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

Optimizing The End-User Experience Across Your Enterprise

Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions

Saint Joseph Abbey and Seminary College Puts Faith in Astaro

Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
    
Astaro

Establish Your Blueprint for Centralized SSL Certificate Lifecycle Management

Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard

IDC's Cloud-based Predictive Analytics: Critical Source of Vendor Differentiation for Enterprises

Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise

HPE InfoSight: Artificial Intelligence for your Hybrid Cloud World

Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Managing infrastructure has always brought frustration, headaches, and wasted time. That’s because IT professionals have to spend their days, nights, and weekends dealing with problems and manually tuning their infrastructure. Traditional monitoring and support are too far removed from infrastructure, resulting in an endless cycle of break-fix-tune-repeat. Infrastructure powered by artificial intelligence, however, can overcome the limitations of humans and traditional tools. This white paper explores how HPE InfoSight with its recommendation engine paves the path for an autonomous data center your Hybrid Cloud World.
Tags : 
    
Hewlett Packard Enterprise

How to Scale Your Support Without Scaling Your Team

Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk

Forrester TEI Report

Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon

Security Delivery Platforms for Dummies

Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon

SC Magazine Market Focus

Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon

Achieving End to End UC Visibility

Published By: Riverbed     Published Date: Jan 25, 2018
"When apps run efficiently, employees are more likely to use them.” The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach helps you
Tags : 
    
Riverbed

Network Monitoring and Troubleshooting for Dummies

Published By: Riverbed     Published Date: Jan 25, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the
Tags : 
    
Riverbed

The Power and Payback of Unified IT Monitoring

Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies

Unified IT Monitoring: A Necessity in the Application Economy

Published By: CA Technologies     Published Date: Nov 12, 2014
This paper explains how CA Unified Infrastructure Management can have an important impact on your business.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies

The Power and Payback of Unified IT Monitoring

Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies

The Drive to Unify Enterprise IT Monitoring

Published By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : 
ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring, business activity monitoring, customer experience management, productivity, business technology, cloud computing, infrastructure, infrastructure management
    
CA Technologies

Free Virtual Appliance for Application Performance Monitoring

Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring, network monitoring, infrastructure performance monitoring, infrastructure monitoring, business transaction management, end-user experience monitoring, end-user monitoring, real-user monitoring, operations analytics, cloud performance monitoring, web performance monitoring, database performance monitoring, citrix performance monitoring
    
ExtraHop

IDC Report: Enabling Finance in a Digital Enterprise to Plan, Monitor, and Predict

Published By: SAP     Published Date: Dec 04, 2015
Supporting the needs of information workers requires the delivery of the latest, relevant information at the point of decision. Download this IDC Report to learn how to enable finance in a digital enterprise to plan, monitor, and predict.
Tags : 
digital enterprise, planning, monitoring, predicting, information industries, information workiers
    
SAP

Private Cloud and Elastic Infrastructure Cut DOD Costs

Published By: Red Hat     Published Date: Jan 01, 2013
Using Red Hat middleware, virtualization, and platform technologies, consultant Booz Allen Hamilton helped the U.S. Department of Defense save $5.1 million through fiscal year 2015. The solution replaced a complex legacy system that could not scale to meet modern demands.
Tags : 
idc, red hat, department of defense, technology consulting, supports elasticity, flexibility, private cloud, elastic infrastructure, increase agility, increase flexibility, automatic scaling, automatic process execution, configurationg management, monitoring capabilities, business activity monitoring, sales automation, contact management, cloud computing, infrastructure
    
Red Hat

Enterprise Data Center Buyer Survey and Interview Insights

Published By: Juniper Networks     Published Date: May 04, 2018
PwC surveyed 235 IT leaders and interviewed another 35 from large, medium, and small enterprises to understand the buying decisions of IT leaders, across a wide variety of networking components (i.e., switches, SDN, and infrastructure monitoring solutions) within the data center. This report highlights the survey and interview insights to help Enterprise IT leaders understand the trends and implications of multi cloud environments.
Tags : 
    
Juniper Networks

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime’s Current Boom

Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies

Application Container Cloud with Java SE and Node

Published By: Oracle     Published Date: Mar 06, 2017
Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production monitoring, or Node.js running on enterprise-grade cloud infrastructure.
Tags : 
    
Oracle

Revolutionising Retail Quality Through a Single Digital Platform

Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.