it monitoring

Results 376 - 400 of 723Sort Results By: Published Date | Title | Company Name

Is your performance management solution a target for attackers?

Published By: Viavi Solutions     Published Date: Aug 05, 2015
With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.
Tags : 
apm, security, hacking, performance monitoring, anti virus, application security, hacker detection, intrusion detection, intrusion prevention
    
Viavi Solutions

IT Impact on Telecommunications Order Fallout

Published By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : 
progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure, best practices, business activity monitoring, business process management, return on investment, risk management, spend management
    
Progress Software BTA Telecommunications

IT Service Delivery Automation - N-able Whitepaper for MSPs

Published By: N-able     Published Date: Nov 23, 2010
IT Service Delivery: From Basic Automation through to Managed Services
Tags : 
it automation, network monitoring, remote desktop, network management, msp, managed services software, productivity, service management, desktop management
    
N-able

IT's Dirty Little Secret

Published By: Dynatrace     Published Date: Dec 16, 2015
Your IT organization devotes huge amounts of effort to monitoring service levels; but are you including End User Experience? When your primary interface with your customer is digital, EUE means a lot, and is a critical driver in business performance.
Tags : 
dynatrace, end user experience, eue, business performance, software development, it management, enterprise applications
    
Dynatrace

ITCAM for Microsoft Applications Customer Implementation Review Case Study

Published By: IBM Corporation     Published Date: Jun 28, 2011
Managing a mixed platform and vendor IT environment presents many challenges. The problems escalate with the number of different tools used to manage the infrastructure. Customers are looking to reduce the number and variety of management tools they must use. One early adopter of IBM's ITCAM for Microsoft Applications shares the lessons learned from that experience and comments on the benefits of the latest version.
Tags : 
enterprise monitoring, service management, tivoli, itcam, netcool, business service, composite application, soa governance, application performance, monitoring, websphere, application monitoring, transaction tracking, diagnostic, ibm isms, application performance management, enterprise resource planning, enterprise software, service oriented architecture
    
IBM Corporation

ITCi White Paper: Challenges and Opportunities of PCI

Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire, pci compliance
    
Tripwire

Its Time: The Hidden Value of Unstructured Data

Published By: Expert System     Published Date: Jul 26, 2019
As companies increasingly recognize the business implications and actionable benefits of AI, the question becomes: How will you use AI for your business? Thanks to the Cogito platform based on AI algorithms, organizations can effectively support and improve unstructured information management and text analytics in order to: Leverage all information, combining internal knowledge with other information sources to extract relevant data Provide effective and real-time insight on strategic initiatives, partners and any third parties Mitigate and even completely avoid risks for operations, reputation, etc. through information analysis and monitoring Know what competitors are doing and intercept market trends Implement automation for the broader, more complex set of processes that involve data Free up teams to focus on more creative or critical activities inside the organization See the entire business through a different perspective
Tags : 
    
Expert System

ITSM Assessment White Paper

Published By: MKAdvantage     Published Date: Feb 03, 2011
This paper describes some best practices around how to gather requirements for an upcoming ITSM project
Tags : 
itsm assessment, itsm requirements, itsm planning, monitoring and management, itil, service management
    
MKAdvantage

Job Monitoring: System Informer or Sixth Sense?

Published By: CCSS     Published Date: Nov 07, 2007
Imagine you had a friend that turned up right before something bad was going to happen and told you how to avoid it. Like if you don't attend to that looping job silently going about its business, the system in India will fall over and the downtime will cost the company hundreds of thousands of dollars in idle work hours. Yes, a friendly forewarning wouldn't be bad. We would suggest employing a job monitor – it's your friend on the inside.
Tags : 
networking, job monitoring, monitoring, network management, network performance, network performance management, job dispatch, productivity, time saving, efficiency, ccss
    
CCSS

Keep unwelcome activity away from your data.

Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems, internet security, security management
    
IBM

Keeping Bot Herders Off Your Servers and Breaking the Lateral Kill Chain of Today's Attackers

Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
    
Lumension

Keeping your cool in a crisis doesn’t have to be a nightmare. Let us show you how.

Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
    
Brandwatch

Key Advantages of Taridium's ipbx Enterprise VoIP Platform

Published By: Taridium     Published Date: May 22, 2007
By combining open source tools and open standards with best of breed hardware and software, taridium can offer one of the best price to performance ratios in the industry. Read how Taridium’s ipbx enterprise VoIP platform combines all the advantages of an open standards solution with the reliability of non-stop hardware, 7x24 monitoring and software support.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, phone, ip networks, taridium, enterprise software
    
Taridium

Learn How Security Intelligence Can Help Combat WikiLeaks Stuxnet and Advanced Threats

Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs

Legal Risks of uncontrolled email and web

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering, web service security, human resources services, workforce management software, employee monitoring software
    
Symantec.cloud

Lenovo XClarity™ - Enhancing Server value with Innovative System Management

Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management, knowledge management, enterprise applications
    
Lenovo

Leveraging Change Control to Meet PCI Requirements

Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core, security, security management, data protection, pci compliance
    
Solidcore

Leveraging Fleet Management Strategies to Drive Operating Efficiencies

Published By: U.S. Cellular     Published Date: Jun 13, 2016
Take your operations to the next level. Learn how fleet management solutions can help your business save time and money with features such as: • Real-time, location monitoring • Automated alerts for proactive vehicle maintenance • Route optimization See examples from different industries, ideas for overcoming common implementation challenges and strategies for adopting your own fleet management program. Download now.
Tags : 
us cellular, business solutions, fleet management, best practices, fleet management programs, location monitoring, route optimization, vehicle maintenance, knowledge management, enterprise applications, business technology
    
U.S. Cellular

Leveraging Threat Intelligence in Security Monitoring

Published By: Norse     Published Date: Apr 10, 2014
Learn the benefits of leveraging threat intelligence in security monitoring and see the protection it can give you against advance threats and malware.
Tags : 
norse, threat intelligence, malware, security, threats, malware analysis, protection, big data, siem, breaches
    
Norse

Leveraging Your Service Desk to Scale Your MSP Business

Published By: Nimsoft     Published Date: Oct 24, 2011
This paper offers tips for offering self-service capabilities to customers, therefor improving customer service levels and satisfaction.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges, convergence, network architecture, network management, application performance management, business activity monitoring, cloud computing, content management, infrastructure
    
Nimsoft

LifeLock Identity Theft Protection Comparison to Typical Free Credit Monitoring

Published By: LifeLock     Published Date: Mar 02, 2015
See a comparison of LifeLock identity theft protection services versus credit monitoring via card companies and credit bureaus.
Tags : 
    
LifeLock

Listen Up! The definitive guide to Social Listening for Smarter Business

Published By: Meltwater     Published Date: Jan 16, 2015
Your customers and competition are talking. Are you listening? Social listening is the most significant technology to hit marketing since social media itself. But marketing isn’t the only department that can utilize social listening: your entire business organization can use social listening to inform its programs, products and business decisions.
Tags : 
meltwater, social media monitoring, media monitoring, social media analytics, media analytics, pr software, social marketing software, social marketing listening, media listening
    
Meltwater

LNS Research: Quality 4.0 Impact and Strategy Handbook

Published By: SAS     Published Date: Mar 06, 2018
The most recent decade has seen rapid advances in connectivity, mobility, analytics, scalability, and data, spawning what has been called the fourth industrial revolution, or Industry 4.0. This fourth industrial revolution has digitalized operations and resulted in transformations in manufacturing efficiency, supply chain performance, product innovation, and in some cases enabled entirely new business models. This transformation should be top of mind for quality leaders, as quality improvement and monitoring are among the top use cases for Industry 4.0. Quality 4.0 is closely aligning quality management with Industry 4.0 to enable enterprise efficiencies, performance, innovation and business models. However, much of the market isn’t focusing on Quality 4.0, since many quality teams are still trying to solve yesterday’s problems: inefficiency caused by fragmented systems, manual metrics calculations, quality teams independently performing quality work with minimal cross-functional own
Tags : 
    
SAS

Lowering Commercial Automotive Insurance Costs

Published By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers don’t lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your company’s bottom line before your drivers even hit the road. In our free white paper, “Lowering Commercial Automotive Fleet Insurance Costs,” we’ll show you: • The many ways vehicle crashes affect the bottom line • A deeper look at the risks of employer- and employee-owned vehicles • How negligent entrustment suits can snare companies in any industry • How to mitigate risk and take control of insurance
Tags : 
    
SambaSaftey
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.