it monitoring

Results 126 - 150 of 723Sort Results By: Published Date | Title | Company Name

Beyond Retail KPIs—Everyday Analytics That Boost Business Performance

Published By: Epicor     Published Date: May 01, 2018
We all know the wisdom of monitoring familiar key performance indicators (KPIs). Turns, gross margin return on investment (GMROI), sales, inventory measures, and other metrics will tell you how your business is faring—and that’s pretty important if you want to keep your hardware store in business. However, just staying in business isn’t enough in a rapidly evolving retail world, so achieving improved KPI results is essential. In this Epicor eBook, you’ll learn about eight easy-to-use tools that go beyond traditional KPIs to quickly improve business results, including: • Reviewing store-to-store sales • Identifying your top 100 items • Monitoring excess inventory • Viewing items with cost change and no retail change Learn more about these tools, and discover what else you can do to improve your KPI results by downloading this Epicor eBook. Download now and go beyond retail KPIs.
Tags : 
retail analytics software, analytics on demand, kpi analytics software, retail kpi software, real time analytics, retail pos software, mobile pos, reporting software
    
Epicor

Big Data Integration and Governance Considerations for Healthcare

Published By: IBM     Published Date: Aug 05, 2014
There is a lot of discussion in the press about Big Data. Big Data is traditionally defined in terms of the three V’s of Volume, Velocity, and Variety. In other words, Big Data is often characterized as high-volume, streaming, and including semi-structured and unstructured formats. Healthcare organizations have produced enormous volumes of unstructured data, such as the notes by physicians and nurses in electronic medical records (EMRs). In addition, healthcare organizations produce streaming data, such as from patient monitoring devices. Now, thanks to emerging technologies such as Hadoop and streams, healthcare organizations are in a position to harness this Big Data to reduce costs and improve patient outcomes. However, this Big Data has profound implications from an Information Governance perspective. In this white paper, we discuss Big Data Governance from the standpoint of three case studies.
Tags : 
ibm, data, big data, information, healthcare, governance, technology, it management
    
IBM

Blue Coat 2011 Mid-Year Security Report

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems

Blue Coat 2011 Mid-Year Security Report

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems UK

Blue Coat Systems 2012 Web Security Report

Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems

Blue Coat WebFilter: Delivering the web access your users want with the control you need

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems

Blue Coat WebPulse: Technical Overview of the WebPulse Collaborative Defense

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems

BMC Helps Dell IT Automate

Published By: BMC ESM     Published Date: Nov 06, 2009
BMC helped the Dell IT group to consolidate job scheduling and job monitoring within a single dashboard, reduce by 75 percent the number of IT administrators needed for patch management, and accelerate trouble-ticket resolution with automation. Watch the customer video.
Tags : 
bsm esm, dell it, automation, consolidation, configuration management, storage virtualization, business process automation, server virtualization
    
BMC ESM

Brandwatch Report: Analyzing Customer Service on Social Media

Published By: Brandwatch     Published Date: Jun 17, 2013
Consumers now expect good customer service via social media…so Brandwatch analyzed 40 leading brands to see which brands were delivering the best social customer service.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch

Bronto Software Buys Splunk versus Extending their Hadoop Deployment

Published By: Splunk     Published Date: Sep 17, 2012
Splunk has become a critical real-time monitoring and analytics tool for Bronto. Read more about Bronto Software's hard and soft ROI's by using Splunk versus extending their Hadoop deployment.
Tags : 
roi, enterprise management associates, real time monitoring, analytics, hadoop, email delivery system, enterprise business solutions, security
    
Splunk

Building a Data-Driven Pricing Strategy

Published By: WNS     Published Date: Jun 21, 2017
Pricing needs to support a brand’s overall marketing platform. But is that enough to assure consistency of message throughout the organization? Given the far-reaching influence a price position has on a brand, and how various departments need to be aligned to support that position, an argument can be made for treating pricing as a core competency within the organization. What does this mean in real terms? Pricing is a day-to-day concern for numerous departments throughout the organization. While marketing might use pricing tactics to grow market share, sales teams chase volume goals, and product development teams lose sleep over the price image each product projects.
Tags : 
profitability, opportunity identification, monitoring and refinement, executive access, own price elasticity, cross price elasticities, price corridors
    
WNS

Building an Intelligence Driven Security Operations Center

Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation

Building Resilience in a Digital Enterprise: Transforming from compliance to risk management

Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security

Burlington Telecom Looks to Asentria for Custom Integrated Monitoring Capabilities

Published By: Asentria Corporation     Published Date: Sep 04, 2007
As a provider of cable television, telephone, and high-speed Internet for the City of Burlington, Vermont, Burlington Telecom (BT) offers communication services to more than 16,000 homes. By the end of 2008, BT’s communications infrastructure will allow every home and business in the city to have access to its fiber optic network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation

Business Process Automation RFI

Published By: K2     Published Date: Aug 24, 2015
This complementary template focuses on the eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering – and to ensure that the system you choose is agile and flexible enough to meet your business needs. WORKFLOW TOOLS AND FEATURES FORMS INTEGRATION AND DATA SECURITY MOBILE USER AND RUN-TIME EXPERIENCE REPORTING, ANALYTICS AND MONITORING MAINTENANCE/SUPPORT/HELP DOCUMENTATION
Tags : 
    
K2

Busted: Seven Myths of Advanced Malware

Published By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security

Busted: Seven Myths of Advanced Malware

Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security

Busting Common Myths of Marketing Automation: The Reality of the Marketing Technology Journey

Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Marketing automation is quickly becoming a competitive necessity for most organizations. According to a recent Demand Gen Report, 42% of b2b marketers identified marketing automation as the tool they plan to test or deploy in 2016—beyond predictive analysis, account-based marketing, lead nurturing, and attribution modeling. Download this white paper to discover how to use marketing automation to attract, engage, and convert buyers across all marketing channels by streamlining workflow, monitoring social, and managing content.
Tags : 
    
Oracle Marketing Cloud

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

CA Threat Analytics for PAM

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA

Capital One: Winner 2014 Awards of Excellence for IT Management Hall of Famers

Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation, it management, knowledge management
    
HP

Cascade Family Brochure - The Cascade Difference: Intelligent, Actionable Information

Published By: Riverbed     Published Date: Jul 17, 2013
To deliver IT performance, you need complete visibility. Riverbed Cascade offers a superior network performance management solution for discovering, monitoring and troubleshooting your network and your critical applications. Now you can resolve performance problems before they impact the business, while lowering your IT management costs. Cascade has an elegant and simple design that deploys easily in complex environments and provides true integration across the Cascade family. This cleaner architecture means superior visibility, management and troubleshooting, saving our customers both capex and opex. According to IDC, Cascade customers typically experience an 83% reduction in mean time to resolution (MTTR)
Tags : 
it performance, cascade, riverbed cascade, riverbed, it management, mttr, idc, infrastructure
    
Riverbed

Cascade Pilot Personal Edition - Network Analysis, Monitoring, Visualization, And Reporting

Published By: Riverbed     Published Date: Jul 17, 2013
"Cascade Pilot Personal Edition is a powerful network analysis, visualization, and reporting tool specifically designed to enhance Wireshark. Because Cascade Pilot Personal Edition is fully integrated with Wireshark, it allows you to easily leverage your team's existing expertise, increasing efficiency in diagnosing your networking issues. Learn more
Tags : 
cascade pilot, network analysis, network, infrastructure, local area networking, network architecture, network management, network performance
    
Riverbed

Case Study: Enterprise Temperature Monitoring

Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
St. Joseph’s Hospital Health Center has a total of 310 refrigerators throughout the organization. These items require strict temperature ranges for quality patient care and safety. Regulatory agencies perform audits requiring logs of temperature monitoring and corrective actions. Read this case study to learn about how St. Joseph's deployed the wireless AeroScout Environmental Monitoring solution to leverage its wireless network by working with STANLEY Healthcare.
Tags : 
wi-fi, environmental monitoring, healthcare, pharmaceuticals, lab samples, patient care, patient safety, temperature monitoring
    
STANLEY Healthcare
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.