it monitoring

Results 301 - 325 of 723Sort Results By: Published Date | Title | Company Name

Gartner: Seven Imperatives to Adopt a CARTA Strategic Approach

Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable

Get started with Puppet on Windows: 9-part recorded webinar series

Published By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
    
Puppet

Getting the Most Out of AppDynamics: A Maturity Model for Application Performance Monitoring

Published By: Ahead     Published Date: Mar 20, 2019
AppDynamics features a robust Application Performance Monitoring (APM) solution, enabling transaction-level performance tracking, application mapping, dynamic baselining and code-level diagnostics.
Tags : 
    
Ahead

Going Beyond Page Load Speed: How T-Mobile mastered digital performance to boost ROI

Published By: Dynatrace     Published Date: Apr 26, 2017
It's impossible to optimize every page and action of every transaction for every device and user location...you need to identify the pages and actions that matter most and build an optimization plan. This report details how T-Mobile did exactly that, and how you can do the same: Base your plan on your own business and visitor data Correlate performance to transaction completion rate Determine where you'll see the most return for your technology and time investment Download the report to read more.
Tags : 
digital experience, digital experience monitoring
    
Dynatrace

Going Hybrid with APM: Because One Size Doesn't Always Fit All

Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud
    
IBM

Guard data in government environments by implementing continuous diagnostics and mitigation

Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
IBM

Guide for Taridium's comms provider VoIP Platform

Published By: Taridium     Published Date: May 22, 2007
Taridium’s comms provider VoIP platform combines all the advantages of an open standards solution with the reliability of non-stop hardware, 7x24 monitoring and software support. Download this product summary and you’ll read why the comm’s platform is a true turn-key solution with fully integrated call rating and billing.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, phone, ip networks
    
Taridium

Guide to IT Best Practices in Application-Aware Network Performance Management

Published By: Fluke Networks     Published Date: Nov 05, 2014
This guide is intended for companies,organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.
Tags : 
aanpm, best practices guide, fluke networks, software development, application performance management, best practices
    
Fluke Networks

Harnessing the Power of an IT Dashboard

Published By: uptime software     Published Date: Dec 06, 2007
Discover the three key reasons how enterprise IT dashboards can deliver highly valuable information to your organization in an easy to use format and provide simple processes that will turn dashboard data into actionable IT decisions.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure
    
uptime software

High-tech Equipment Manufacturer Improves Operation with Statistica

Published By: TIBCO Software     Published Date: Aug 15, 2018
World leader in design and manufacture of innovative sensing solutions that enhance safety, security, and energy efficiency. For this manufacturers of high-tech imaging systems, monitoring accuracy and product quality are critical. Any quality problem could mean a part fails sooner than expected, or triggers a false alarm at a customer site that causes unnecessary panic. By setting up automated manufacturing analytic workflows with the TIBCO StatisticaTM platform, the company can complete complicated processes in just a few minutes and improve product quality by decreasing the variability of everything they produce.
Tags : 
    
TIBCO Software

Hosted Web Analytics Versus Server Log Files

Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat

How CA Cloud Service Management Speeds Deployment and Time to Value

Published By: CA Technologies     Published Date: Feb 13, 2015
For years, many support teams have been hamstrung by their traditional service desk platforms, which require complex, time-consuming coding for virtually every aspect of customization. This complexity makes it costly and difficult for support organizations to adapt—and places an increasingly substantial burden on the agility and efficiency of the business as a whole. CA Cloud Service Management is a clearly differentiated alternative to traditional service desk platforms. CA Cloud Service Management is purpose built for speed—rapidly accelerating time-to-value where other SaaS solutions fall short. Implement in days, adopt with minimal training, configure without programmers, automate end-user requests, and get automatic upgrades.
Tags : 
service management, deployment, time to value, cloud monitoring, cloud metrics, business analytics, performance monitoring, data
    
CA Technologies

How Can Workload Automation Help Me Align Enterprise IT Resources to Improve Service & Manage Risks?

Published By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : 
web services, bpm, business process, ca wa, workload automation
    
CA WA

How Connected Care Can Save Lives, Digitally

Published By: Infosys     Published Date: May 21, 2018
There are several reasons for this, including the inability of healthcare institutions to constantly monitor post-operative deterioration as well as patient's inability to visit the healthcare center for post-operation followups. Most of the patient data is recorded manually. This data is often weaned from displays of multiple monitoring devices like vitals monitor, infusion pumps, and ventilators. More often than not, these devices do not talk to each other or to a central system. Doctors, nurses, or other care-givers manually note down patient statistics in their files and notepads. Even though the healthcare industry is in the throes of digitization, there's still a lot of paper doing the rounds. eventually, the data from these physical sheets might be fed into an electronic system, but there is a high chance of error in that process.
Tags : 
digital, connected, care, patient, healthcare
    
Infosys

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor

How Foglight Makes User Experience Management a Reality: Three Case Studies

Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software

How OneLogin Saves DevOps Time, Money, and Resources with Threat Stack

Published By: AWS     Published Date: Oct 07, 2019
As companies like yours scale their cloud environment, the question has evolved from “what do I need to protect” to “how do I control and monitor what I am responsible for?” Many companies, especially those who are born on the cloud, or who are more cloud-mature understand the Shared Responsibility Model. Now, they are focusing on building a strategy that gives them greater control and visibility of their cloud environment. Gartner reported that “In 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.” Having the right monitoring strategy is beneficial for multiple reasons, and this eBook will detail how OneLogin implemented it in their AWS environment, and why you should consider implementing it in yours.
Tags : 
    
AWS

How REI Uses Intelligent Threat Detection and Edge Protection on AWS with Splunk

Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS

How SambaSafety driver monitoring keeps DS Services on the cutting edge

Published By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
    
SambaSaftey

How to Build a Security Operations Center (on a Budget)

Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault

How to Detect Hackers on Your Web Server

Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager
    
GFI

How to Drastically Improve Your Third-Party Security Compliance

Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
BitSight Technologies

How to Find your Audience on Social Media: Using Social Data to Determine Your Social Media Mix

Published By: Tracx     Published Date: Mar 08, 2017
"The social internet is big, noisy, and always in flux — which makes it really hard to know where your audience is spending their time and how to reach them there. So, we've done the research for you. (You're welcome.) Join us for this on-demand webinar to learn why a ""listen-first"" philosophy sets your team up to discover game-changing opportunities before your competitors do. In this on-demand webinar, you'll learn: *How to create your ideal social media mix *The most up-to-date audience demographics from Facebook, Instragram, Twitter, Linkedin, Pinterest, Reddit, and more *Top performing networks based on industry demographics *When to adopt new networks (and when to ignore) *Where companies like yours spend time on social media (and where the missed opportunities are)."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics
    
Tracx

How To Gain a 360 Degree View of Your Competitors' Marketing

Published By: Hubspot     Published Date: Apr 23, 2013
Effective marketing starts with understanding the buyer, but also understanding your competitors. It's important to see where your competitors are succeeding, and where they're failing. Download this guide to help you stay up to speed with what your competitors are doing while staying on track for your own business strategy.
Tags : 
marketing software, competitive intelligence, competitive marketing, marketing audit, marketing strategy, monitoring and benchmarking, tracking competitors, hubspot
    
Hubspot

How to Leverage a Big Data Model in the Network Monitoring Domain

Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.
Tags : 
networking, big data, network monitoring, optimization, data center, monitoring
    
VSS Monitoring
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.