it monitoring

Results 501 - 525 of 714Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 05, 2014
There is a lot of discussion in the press about Big Data. Big Data is traditionally defined in terms of the three Vs of Volume, Velocity, and Variety. In other words, Big Data is often characterized as high-volume, streaming, and including semi-structured and unstructured formats. Healthcare organizations have produced enormous volumes of unstructured data, such as the notes by physicians and nurses in electronic medical records (EMRs). In addition, healthcare organizations produce streaming data, such as from patient monitoring devices. Now, thanks to emerging technologies such as Hadoop and streams, healthcare organizations are in a position to harness this Big Data to reduce costs and improve patient outcomes. However, this Big Data has profound implications from an Information Governance perspective. In this white paper, we discuss Big Data Governance from the standpoint of three case studies.
Tags : 
ibm, data, big data, information, healthcare, governance, technology, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution, security, it management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.
Tags : 
security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, security, managed security monitoring, enterprise applications
    
IBM
Published By: Gomez IT     Published Date: May 24, 2011
This white paper addresses best practices for web performance monitoring, and provides guidance on selecting the best approach for your business.
Tags : 
gomez, compuware, web performance monitoring, web 2.0 application, end-user experience, last mile, internet backbone, business success
    
Gomez IT
Published By: VMware     Published Date: Aug 09, 2012
This technical white paper covers the the vSphere Storage Appliance (VSA) architecture, deployment of a VSA cluster, and basic monitoring and management.
Tags : 
vsa, vsphere storage appliance, storage, data storage, security, vmware, clustering, backup and recovery
    
VMware
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : 
white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions
    
Eaton Corp.
Published By: VMS     Published Date: Jul 31, 2009
If management has not already cut your budget, be prepared to “prove it or lose it” soon. This report will help you think through your measurement strategies, and either fine-tune an existing program, or get one started post haste.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share
    
VMS
Published By: VMS     Published Date: Jul 31, 2009
One of the big challenges with massive PR initiatives is the difficulty in measuring the outcomes as it pertains to your brand and business objectives set. Read this guide for a five step process that will help you determine the impact of your PR initiatives and compare it to the organizational goals they were aimed to accomplish.
Tags : 
awareness, preferences, share, share of discussion, brand equity, cgm/wom, goals, economy
    
VMS
Published By: VMS     Published Date: Jul 31, 2009
In the times of increased awareness and integrated communication across channels, it is crucial to understand correlation between the advertising spend and the PR that surrounds your brand. This report sheds new light on the impact of earned and paid media on the effectiveness of paid advertising.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share
    
VMS
Published By: Unitrends     Published Date: Apr 12, 2010
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users?
Tags : 
unitrends, backup, data protection, data quality, server, replication, lossless, lossy
    
Unitrends
Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches cant provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security
    
Cisco
Published By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : 
sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring
    
Metalogix
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Verio     Published Date: Aug 06, 2014
Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. Using NTTs vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).
Tags : 
ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws
    
Verio
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
cPacket Networks
Published By: CA Technologies     Published Date: Aug 19, 2014
As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.
Tags : 
ca technologies, dcim, data center, data center operations, infrastructure, blade servers, storage management, server virtualization
    
CA Technologies
Published By: Symantec     Published Date: Oct 20, 2014
ApplicationHA leverages more than 12 years of development of well-known Symantec Cluster Server technology to provide an application monitoring package that runs inside a Hyper-V guest operating system, with full integration for Failover Clustering and the Heartbeat monitoring service.
Tags : 
symantec, business critical applications, virtualization, data center, hyper v, network architecture, servers, clustering
    
Symantec
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.