it monitoring

Results 376 - 400 of 721Sort Results By: Published Date | Title | Company Name

Integrate facilities and IT. Realize the value of the green data center.

Published By: IBM     Published Date: Sep 10, 2009
As data center costs continue to rise, green is the word of the day. What it means is cost savings through consolidation and lower energy usage, as this white paper shows. See the role energy consumption plays in today's data centers, and how IBM Tivoli solutions can help optimize energy use in the data center.
Tags : 
ibm, u.s. environmental protection agency, green data centers, visualization and reporting, asset management and spatial awareness, optimizing power usage and cost, ibm tivoli, storage, storage management, application integration, productivity, project management
    
IBM

Keep unwelcome activity away from your data.

Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems, internet security, security management
    
IBM

Your Enterprise Database Security Strategy 2010

Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption, compliance, intrusion detection, intrusion prevention, policy based management
    
IBM

Customer Relationship Management: Secrets to CRM Success

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm, microsoft dynamics, business analytics, customer relationship management, sales & marketing software, contact management
    
Microsoft Dynamics

FISMA Best Practices: Overcoming Persistent Weaknesses Through Effective Security Compliance

Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics, compliance, security management, best practices, risk management, database security
    
netForensics

The Forrester Wave: Complex Event Processing (CEP) Platforms, Q3 2009

Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom, application performance management, business activity monitoring, business analytics, business management, business process automation, application integration
    
Progress Software Corporation CEP

Transport & Logistics: Event Processing in Transport and Logistics

Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening, consolidation, lifecycle, business activity monitoring, bam, business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom, application performance management
    
Progress Software Corporation CEP

Actional Core Architecture: Enable end-to-end transaction monitoring and alerting

Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management, business management, business process management, service oriented architecture, web service management
    
Progress Software BTA Financial

IT Impact on Telecommunications Order Fallout

Published By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : 
progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure, best practices, business activity monitoring, business process management, return on investment, risk management, spend management
    
Progress Software BTA Telecommunications

Actional Core Architecture: Enable end-to-end transaction monitoring and alerting

Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management, business activity monitoring, business process management, service oriented architecture
    
Progress Software BTA Telecommunications

Tripwire's Solutions for Automated, Continuous PCI Compliance

Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management, security management, configuration management
    
Tripwire, Inc

Improving First-Call Resolution with Team Collaboration Technology

Published By: Citrix Online     Published Date: Jun 09, 2010
This new white paper examines key challenges facing customer support organizations and explores the many advantages of collaborative remote support, including ad hoc training, faster first-contact resolution and an improved customer experience.
Tags : 
citrix gotoassist, corporate remote support, customer service, loyalty rentention, desktop management, manager monitoring, remote access, remote network management
    
Citrix Online

Developing Scenario Segmentation and Anomaly Detection Models

Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS

2013 Ultimate Buyers Guide to Endpoint Management Solutions

Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus, application security, security management, security policies, application performance management, best practices, business activity monitoring, vulnerability management
    
Lumension

Everything Matters: Every Setting, Every Component, Every Technology

Published By: Lumension     Published Date: Jan 22, 2013
You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spyware, anti virus, application security, auditing, business continuity, encryption, hacker detection, best practices, data loss prevention
    
Lumension

A CFOs Guide to Why Standalone AV is No Longer Enough

Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Lumension

Keeping Bot Herders Off Your Servers and Breaking the Lateral Kill Chain of Today's Attackers

Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
    
Lumension

Windows 8 Is Coming to a BYOD Near You: Are the New Security Features Enough?

Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
    
Lumension

Market Overview: Priviledged Identity Management

Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, auditing, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, password management, vulnerability management
    
NetIQ

Sustainable Compliance: How to Align Compliance, Security and Business Goals

Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance, access control, compliance, internet security, intrusion detection, intrusion prevention, vulnerability management
    
NetIQ

Zero Trust with John Kindervag

Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ

ITCAM for Microsoft Applications Customer Implementation Review Case Study

Published By: IBM Corporation     Published Date: Jun 28, 2011
Managing a mixed platform and vendor IT environment presents many challenges. The problems escalate with the number of different tools used to manage the infrastructure. Customers are looking to reduce the number and variety of management tools they must use. One early adopter of IBM's ITCAM for Microsoft Applications shares the lessons learned from that experience and comments on the benefits of the latest version.
Tags : 
enterprise monitoring, service management, tivoli, itcam, netcool, business service, composite application, soa governance, application performance, monitoring, websphere, application monitoring, transaction tracking, diagnostic, ibm isms, application performance management, enterprise resource planning, enterprise software, service oriented architecture
    
IBM Corporation

Monitor services in the cloud: Tips, tricks and tools

Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Are you getting the most you can out of your resource utilization? This technical note features two scenarios designed to illustrate the technical process of monitoring cloud services. Learn more about these time-saving,effective options for monitoring in the IBM Cloud.
Tags : 
cloud, components, hardware, ibm corp., monitor, resource, utilization, ibm, backup and recovery, blade servers, storage area networks, storage management, storage virtualization, cloud computing, virtualization
    
IBM Cloud Business

Client-Driven Redesign of Mainframe Performance

Published By: IBM     Published Date: Nov 09, 2012
This research report looks at the client driven redesign of mainframe performance and availability monitoring. Clabby Analytics also got the opportunity to review IBM's new OMEGAMON V5 mainframe which has improved it's features.
Tags : 
omegamon v 5.1, ibm, mainframe, analytics, it architecture, enterprise applications, data management, business technology
    
IBM
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.