it monitoring

Results 376 - 400 of 714Sort Results By: Published Date | Title | Company Name
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening
    
Progress Software Corporation CEP
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : 
progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure, best practices
    
Progress Software BTA Telecommunications
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper, application integration, application performance management
    
Progress Software BTA Telecommunications
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: Citrix Online     Published Date: Jun 09, 2010
This new white paper examines key challenges facing customer support organizations and explores the many advantages of collaborative remote support, including ad hoc training, faster first-contact resolution and an improved customer experience.
Tags : 
citrix gotoassist, corporate remote support, customer service, loyalty rentention, desktop management, manager monitoring, remote access, remote network management
    
Citrix Online
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
You just cant cut corners today. In fact you need to be very careful about even optimizing your security efforts because its so easy to misjudge what needs to be secured and what doesnt; what deserves your attention and what doesnt.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spyware
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms and quantifies the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, Ill look at everything thats new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
Lumension
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc
    
NetIQ
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 28, 2011
Managing a mixed platform and vendor IT environment presents many challenges. The problems escalate with the number of different tools used to manage the infrastructure. Customers are looking to reduce the number and variety of management tools they must use. One early adopter of IBM's ITCAM for Microsoft Applications shares the lessons learned from that experience and comments on the benefits of the latest version.
Tags : 
enterprise monitoring, service management, tivoli, itcam, netcool, business service, composite application, soa governance
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 28, 2011
Realize the value of green with IBM Tivoli Monitoring for Energy Management
Tags : 
tivoli, ibm, energy, management, green, infrastructure, energy management, energy efficiency
    
IBM Corporation
Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Are you getting the most you can out of your resource utilization? This technical note features two scenarios designed to illustrate the technical process of monitoring cloud services. Learn more about these time-saving,effective options for monitoring in the IBM Cloud.
Tags : 
cloud, components, hardware, ibm corp., monitor, resource, utilization, ibm
    
IBM Cloud Business
Published By: IBM     Published Date: Nov 09, 2012
This research report looks at the client driven redesign of mainframe performance and availability monitoring. Clabby Analytics also got the opportunity to review IBM's new OMEGAMON V5 mainframe which has improved it's features.
Tags : 
omegamon v 5.1, ibm, mainframe, analytics, it architecture, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed
    
Intel
Published By: Crimson Hexagon     Published Date: Aug 26, 2014
In this paper, we introduce the essential components of online opinion monitoring. By incorporating them into your analysis, you can take full advantage of the opportunities that social media offers to you. Opinion monitoring will help you to develop informed advertising and marketing strategies that promote your brands market success.
Tags : 
crimson hexagon, social media, branding, measuring brand impact, brand impact, social media marketing, online opinion monitoring, opinion monitoring
    
Crimson Hexagon
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.