it monitoring

Results 426 - 450 of 721Sort Results By: Published Date | Title | Company Name

Fair to Partly Cloudy

Published By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : 
nimsoft, cloud service, delivery, models, monitor, monitoring, challenges, access control, compliance, identity management, cloud computing, infrastructure, design and facilities
    
Nimsoft

vSphere Storage Appliance Technical White Paper

Published By: VMware     Published Date: Dec 17, 2012
This technical white paper covers the the vSphere(r) Storage Appliance (VSA) architecture, deployment of a VSA cluster, and basic monitoring and management.
Tags : 
storage, shared storage, cloud, drs, disaster recovery, backup and recovery, storage management, storage virtualization, database security, business technology, cloud computing, infrastructure
    
VMware

Continuous Security Monitoring

Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management, csm platform, use cases, attacks, change control, compliance, security, data protection, cloud computing
    
Qualys

Servers So Intelligent, They Redefine the Service Experience

Published By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
HP has developed new online and enhanced remote service technologies designed to capitalize on the embedded HP ProLiant Gen8 management and monitoring capabilities.
Tags : 
servers, intel, gen8, cloud, business technology, cloud computing
    
HP and Intel® Xeon® processors

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security with Anton Chuvakin

Published By: Tripwire     Published Date: Oct 14, 2010
In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.
Tags : 
tripwire, siem, compliance, security, log management, log data, real-time monitoring, monitoring, security management, pci compliance
    
Tripwire

IBM Integrated Data Management Tools for DBAs

Published By: IBM     Published Date: Feb 18, 2009
Let’s face it, DBAs have a tough job.  DBAs must manage a complex set of tasks including ensuring high performance and availability, maintaining business critical production applications and managing changes. 
Tags : 
: ibm integrated data management, dbas, performance monitoring, data management tools, data retention, data growth, enterprise applications, data management, database development, business intelligence, database security
    
IBM

New Integrated Data Management Tools for DBAs

Published By: IBM     Published Date: Aug 25, 2009
Reduce the long, after hours finger pointing through proactive performance monitoring all while facilitating collaboration and driving organizational efficiencies.
Tags : 
data management tools, ibm, dba, manage database, application changes, proactive performance monitoring, after hours finger pointing, organizational efficiencies, sla, business activity monitoring, business intelligence, business management, system management software, database development, data integration, data quality, productivity, data warehousing
    
IBM

Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.

Osterman Research: Why Your Organization Needs to Implement DLP

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

How to Make the Case for IT Automation

Published By: Kaseya     Published Date: Sep 04, 2008
The benefits of automation are clear, but how do they translate-in hours and dollars saved-in the real world? To help IT professionals find out, Kaseya has teamed with Ziff Davis Enterprise to present this fact filled white paper on making the case for Automation.
Tags : 
kaseya, it automation, cio, helpdesk, monitoring, automation tools, service desk, help desk, business management, business process automation, business process management, enterprise software, marketing automation, system management software
    
Kaseya

5 Steps to Assuring Quality of Experience

Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices, security management
    
EMA

When Application Performance is Better, Business Works Better

Published By: Hewlett-Packard     Published Date: Jul 24, 2013
Isolating application problems can be challenging in highly virtualized or cloud environments. This paper offers a roadmap to optimize application performance management with a pragmatic, phased approach that goes beyond monitoring and focuses on support for composite applications, SOA, and ERP applications.
Tags : 
application performance, apps, soa, erp, applications, cloud, application integration, application performance management, best practices, business analytics, business intelligence, cloud computing, infrastructure management
    
Hewlett-Packard

Security Automation: Security Nirvana or Just a Fad?

Published By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
    
Symantec

Oracle Talent Cloud: A Strategic Approach to Talent Management

Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle

Oracle Talent Cloud: A Strategic Approach to Talent Management

Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle

Oracle Talent Cloud: A Strategic Approach to Talent Management

Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle

Lumension Guide to Patch Management Best Practices

Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques, backup and recovery, business management, change management
    
Lumension

O’Reilly Report - 6 Tips to Optimize Your Cloud and Your Infrastructure

Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn

Managed Service Provider Simplifies Deployment and Management of Systems in Customer Data Centers

Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp

Failing to Meet Mobile App User Expectations; A Mobile User Survey

Published By: HP AppPulse Mobile     Published Date: Jun 05, 2015
With this Dimensional Research report, discover how mobile monitoring software can help you better understand users and their experience with your mobile application. Users reach for mobile devices many times every day, specifically to use mobile apps. Mobile device users heavily rely on peer reviews and star ratings to help them choose their apps. Once a mobile app is installed, that app is judged for its speed, responsiveness and stability, which define the user experience and overall satisfaction.
Tags : 
mobile, applications, customer satisfaction, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
HP AppPulse Mobile

4 Step Get Started Guide to Open Source Security Triage

Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.