it monitoring

Results 176 - 200 of 723Sort Results By: Published Date | Title | Company Name

Container Monitoring and Management

Published By: CA Technologies EMEA     Published Date: May 29, 2018
In time, containers will be the means by which all workloads are deployed on server platforms. It makes too much sense. Constructing fake machines around virtual workloads, just to make them portable across servers, was not the architecturally rational thing to do. It was the expedient thing to do, because cloud platforms had not yet evolved to where they needed to be. This book presents a snapshot of the emerging approaches to container monitoring and distributed systems management that engineers and their customers are building together.
Tags : 
    
CA Technologies EMEA

Content Security

Published By: Microworld     Published Date: Dec 12, 2007
Content Security refers to monitoring Internet access and e-mail activity in your network. This white paper provides information about Content Security, its need and recommends features that good Content Security software should have.
Tags : 
email content, content security, anti spam, internet security, email security, internet security, spam, filtering
    
Microworld

Continuous Compliance to the Rescue

Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
McAfee

Continuous Monitoring: A New Blueprint for Achieving Continuous Security & Compliance

Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices, security
    
Qualys

Continuous Monitoring: A New Blueprint for Achieving Continuous Security & Compliance

Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations, security
    
Qualys

Continuous Monitoring: Own Your Network in 4 Simple Phases

Published By: Tripwire     Published Date: Nov 07, 2012
The thought of continuous monitoring is an ancient concept. Many federal agencies are required to continuously monitor their systems. Read on to learn what continuous monitoring is and how organizations can devise a solution that works.
Tags : 
tripwire, continuous monitoring, security, data breach, it security, data management, business technology, data center
    
Tripwire

Continuous Security Monitoring

Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management
    
Qualys

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, security, software development, it management, knowledge management, enterprise applications, platforms, storage
    
BitSight Technologies

Controlling Web 2.0 Applications in the Enterprise

Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security, application security, network security appliance
    
Fortinet, Inc.

Convergent PR: The Best of Both Worlds

Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
    
Godfrey

Cost-Effective Database Protection to Meet Your Compliance Requirements

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee

Could Second Generation IVR Surveys replace Call Recording in FCR and Quality Monitoring?

Published By: Right First Time Contact Centre     Published Date: Mar 12, 2011
Examines how call recording-based quality monitoring can be improved with the addition of IVR Surveys
Tags : 
ivr surveys, fcr, first contact resolution, customer research, contact center, contact centre
    
Right First Time Contact Centre

County Leverages Telecom Accounting Into Far-Reaching Network Management

Published By: Asentria Corporation     Published Date: Sep 04, 2007
The use of pollable remote access units enable integration of phone systems with telecommunications management, plus system-wide access, monitoring and alarm notification that includes unmanned remote sites. Few telephone networks connect a user base that is involved in such a multitude of vital services as local government.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation

Creating A Better Healthcare Cold Chain: 7 experts reveal best practices to improve efficiency

Published By: UPS     Published Date: May 22, 2017
Learn how improved visibility, new tools, new monitoring capabilities and appropriate packaging can help drive down costs for shippers.
Tags : 
ups, shipping, cold chain, 3pls, collaboration, packaging, best practices, customer satisfaction
    
UPS

Creating A Better Healthcare Cold Chain: 7 experts reveal best practices to improve efficiency

Published By: UPS     Published Date: Sep 01, 2017
Growth in new markets introduces new costs to control, regulations to manage, and supply chain complexities to solve. Longer, more complicated cold chains mean that collaboration with third party logistics providers (3PLs) can help make the difference between profitable simplicity and unmanageable complexity. Companies are increasingly relying on their 3PLs for services such as monitoring and intervention, contingency planning, and cost control. Reduce risk by improving packaging, visibility, and establishing QA best practices. Improved visibility, new tools, new monitoring capabilities and appropriate packaging can also help drive down costs for shippers.
Tags : 
healthcare, cold chain, efficiency, ups, practices
    
UPS

Credit risk management: Collateral, covenants and risk review

Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM

Crimeware Protection: 3rd Generation Intel® Core vPro Processors

Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security
    
Intel

Critical Capabilities for Security Information and Event Management

Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm

Customer Relationship Management: Secrets to CRM Success

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm
    
Microsoft Dynamics

Cutting Right to the Code

Published By: Microsoft Carat APAC     Published Date: Dec 12, 2017
Web apps once thought impossible due to scale, complexity, or because they simply couldn’t be imagined, are now a reality with the cloud. In this guide, we’ve explored the Azure App Service and highlighted Azure’s support for platform as a service (PaaS). We’ve shown you how you can take an existing website backed by a SQL Server database and move it to the cloud. You’ve seen how you can easily add features such as identity management and caching to your web app. You’ve also learned that you can enable rich application monitoring with a few clicks.
Tags : 
code, business, optimization, scale, support, cloud, paas
    
Microsoft Carat APAC

Cyber-bullying: A Digital Epidemic

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
WatchGuard Technologies

Data Governance for Operational Data Quality

Published By: Trillium Software     Published Date: Jun 06, 2011
The second Web seminar in the series is titled "Data Governance". Learn how Digital River successfully implemented Data Governance across their organization.
Tags : 
trillium software, operational data quality, upstream operational systems, data governance, data monitoring, businessprocesses, digital river, data management
    
Trillium Software

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.

Data Quality for BASEL II

Published By: Trillium Software     Published Date: May 19, 2011
Today financial services institutions must meet the standards for data quality attestation by the FFEIC regulators of risk reporting. This paper discusses the platform and domain expertise needed to support the rigorous demands of commercial and retail risk reporting.
Tags : 
trillium software, data quality management, basel ii solution, data profiling, data monitoring, metadata, data supporting risk, grc
    
Trillium Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.