monitoring actions

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name

LTI helped a US-based banking major improve its case investigation TAT by 50%

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI built a transaction monitoring cognitive data lake to facilitate AML transaction monitoring across post trade transactions for a leading global bank, which resulted in reduction of human errors by 30% and TAT improvement by 50%. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

6 Secrets to Offering Exceptional Customer Service

Published By: Salesforce.com     Published Date: Oct 28, 2013
Just 7% of consumers say that customer service experiences they have with companies typically exceed their expectations. Now think about how you could succeed and profit as a business if you not only continually offered good service to your customers, but also frequently offered more than what they expected. Discover: The secrets to lining up your customer service with your brand. The best way to train employees. How to make employees feel good about giving great service. The significance of monitoring customer interactions. Which customer metrics you should pay attention to. The cheapest way to earn new customers. Download this ebook to learn what you need to do to give customers what they want and earn a customer for life!
Tags : 
customer service, best practices, 6 secrets, managing expectations, employee training, metrics, customer interactions, customer interaction service
    
Salesforce.com

Identity Theft Protection Guide

Published By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : 
best practices, identity theft, security, protection, business technology
    
LifeLock

Case Study: Enterprise Temperature Monitoring

Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
St. Joseph’s Hospital Health Center has a total of 310 refrigerators throughout the organization. These items require strict temperature ranges for quality patient care and safety. Regulatory agencies perform audits requiring logs of temperature monitoring and corrective actions. Read this case study to learn about how St. Joseph's deployed the wireless AeroScout Environmental Monitoring solution to leverage its wireless network by working with STANLEY Healthcare.
Tags : 
wi-fi, environmental monitoring, healthcare, pharmaceuticals, lab samples, patient care, patient safety, temperature monitoring
    
STANLEY Healthcare

SANS - Keys to the Kingdom: Monitoring Privileged User Actions for Security and Compliance

Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
LogRhythm

Three Key Technology Challenges in Protecting Sensitive Data

Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring
    
McAfee

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

Applying an Economic Model to IT Management: Operations Management in the Virtual Data Center

Published By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo

How to Leverage Quality Management for Regulatory Compliance

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
In today's regulations and risk management, business has become increasingly complex, and penalties are growing. Managing risk must therefore include monitoring the actions of your entire organization and more. Read on to learn more about compliance.
Tags : 
quality management, regulatory compliance, risk management, complex risk, monitoring actions, data management, business technology
    
Interactive Intelligence

Benefits of Custom Application Monitoring

Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load
    
NeoSpire Managed Hosting

Get Ahead of Fraud: Taking an Algorithmic Approach

Published By: TIBCO Software     Published Date: May 16, 2019
This infographic describes the growing financial crime problem from several perspectives and sets out reasons why now is the time to move to self-learning analytics and other technologies available on the TIBCO platform for: Monitoring transactions as they occur Easily generating contextual views using accurate, real-time information Expediting the investigation process Evaluating potentially risky transactions Making the right decisions quickly
Tags : 
    
TIBCO Software
Search      

Add Research

Get your company's research in the hands of targeted business professionals.