it monitoring

Results 476 - 500 of 718Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 14, 2014
This paper will consider the relevance of measurement and monitoring defining inspection routines, inserting them into the end-to-end application processing, and reporting the results.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
    
SAS
Published By: e-DMZ Security LLC     Published Date: Nov 16, 2010
This whitepaper discusses how e-DMZ Security's Total Privileged Access Management enhances host controls to deliver PCI compliance.
Tags : 
e-dmz security, pci compliance, compliance, pci dss, access control, password management, privileged users, security management
    
e-DMZ Security LLC
Published By: EMA     Published Date: Aug 21, 2012
As network traffic continues to grow, network-based security, performance and compliance monitoring becomes increasingly critical.
Tags : 
ema, ixia, roi network, trafficing, jim frey, security
    
EMA
Published By: SpectorSoft     Published Date: Aug 28, 2012
This whitepaper will describe the best methodologies used to perform investigations, and why investigating proactively can help.
Tags : 
human resources, spectorsoft, employee investigations, file auditing, user activity monitoring, human resource technology
    
SpectorSoft
Published By: Port25 Solutions     Published Date: Mar 27, 2012
Prioritized Email Delivery Streams, large queue management and Email Delivery monitoring configuration and reputation.
Tags : 
productivity
    
Port25 Solutions
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
    
Splunk
Published By: Aternity     Published Date: Sep 10, 2012
Virtualization is a key disruptive technology for IT requiring radical changes in thinking and operating procedures to better plan, manage, provision and orchestrate resources throughout the enterprise.
Tags : 
user experience, aternity, virtual desktop, desktop virtualization, virtual platform, performance intelligence, application performance, it management
    
Aternity
Published By: IBM     Published Date: Nov 08, 2013
Prevent asset failure and optimize processes with IBM Predictive Maintenance and Quality.
Tags : 
ibm, reduce asset downtime, improve product quality, performance expectations, ill-timed maintenance, optimize physical assets, predictive maintenance and quality, asset-intensive
    
IBM
Published By: Intacct     Published Date: Sep 09, 2014
The professional services market is backand more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: The importance and primary characteristics of financial maturity. The 5 financial metrics critical to service organizations. Where successful service organizations fall in these metrics.
Tags : 
financial success, profit, professional services
    
Intacct
Published By: Cisco     Published Date: Sep 07, 2016
This white paper discusses how the data broker along with Cisco Nexus 9000 Series Switches integrates with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Tags : 
    
Cisco
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
The way companies listen and react to customers through social channels is crucial for businesses today. Social data is raw, real, uniquely insightful and the most authentic representative that marketers have seen in many years. Companies have the opportunity to take rich data and truly learn, understand and engage customers better than they ever have before. Hear how companies like General Motors are using Social Command Centers to improve their customer experience interactions and drive product innovations.
Tags : 
command center, social listening, influencers, digital, social marketing, social intelligence, cmo, oracle
    
Oracle Social Cloud
Published By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : 
security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Citrix Online     Published Date: Jul 01, 2010
This new SPI white paper provides guidance on developing an effective strategy for monitoring, measuring and managing your professional services organization.
Tags : 
citrix online tech, monitoring, measurement, key performance indicators, kpi, tco, test and measurement, application performance management
    
Citrix Online
Published By: Citrix Online     Published Date: Jul 01, 2010
This new ServiceXRG white paper explores the importance of quantifying the impact of support on your business.
Tags : 
citrix online tech, monitoring, measurement, servicexrg, tco, business metrics, performance benchmarking, test and measurement
    
Citrix Online
Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : 
tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure, security management
    
Tripwire
Published By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : 
tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert
    
Tripwire
Published By: EMA     Published Date: Apr 01, 2014
Application-aware Network Performance Management (AANPM) practices and products provide detailed insights into exactly who is using which resources, what quality of experience is taking place, and where to look when things go wrong. Such information can significantly improve planning, monitoring, and troubleshooting efforts.
Tags : 
ema, application aware network performace, aanpm, quality of experience, research, it management, data management, consulting
    
EMA
Published By: IBM     Published Date: Feb 25, 2014
In their efforts to keep up with these varied needs, healthcare organizations are experiencing a proliferation of assets and asset types. But assets themselves are experiencing a convergence. Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices for communications and record keeping share a common foundation. An enterprise asset management system can be at the core of this transformation. Download the whitepaper to learn more.
Tags : 
    
IBM
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.