it monitoring

Results 526 - 550 of 714Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Oct 20, 2014
Symantec ApplicationHA helps you create a resilient VMware environment to deliver effective business services to your end users with virtual machine restart as well as application level monitoring and restart. ApplicationHA is fully compatible with your existing tools such as VMware High Availability, vMotion, FT, DRS and SRM.
Tags : 
symantec, vmware, business applications, apm, virtualization, storage virtualization, application performance management, server virtualization, service management, data center design and management
    
Symantec
Published By: APC by Schneider Electric     Published Date: Jan 21, 2016
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting.
Tags : 
cbs interactive, server, data, cloud, security, migration, monitoring, network architecture, servers, power and cooling, data center design and management
    
APC by Schneider Electric
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Datadog     Published Date: Feb 10, 2016
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. Today we're excited to share what we can see about true Docker adoptionno hype, just the facts.
Tags : 
datadog, docker, software trend, information technology, data management, kubernetes, container, microservices, docker swarm, infrastructure monitoring, container monitoring
    
Datadog
Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
IBM
Published By: IBM     Published Date: Nov 06, 2014
In this webcast, youll learn how IBM SmartCloud AnalyticsPredictive Insights helps you prevent application degradation and service outages.
Tags : 
operations analytics, it analytics, service outage prevention, monitoring management solutions, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, middleware, database development, productivity, service management
    
IBM
Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security, network security appliance, vulnerability management
    
Rapid7
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, it service management, itil, performance testing, sla, sla management services, testing, wla, visibility, configuration management, metadata
    
ASG Software Solutions
Published By: Emerson Network Power     Published Date: Nov 02, 2010
The ten steps outlined in this paper represent proven strategies for improving data efficiency and availability and create the foundation for holistic data center infrastructure management.
Tags : 
virtualization, high availability, emerson power network, liebert, data center infrastructure management, dcim, power usage, precision cooling, energy efficiency, infrastructure, power and cooling, data center design and management
    
Emerson Network Power
Published By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : 
virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits, servers, storage virtualization, data center, power and cooling
    
Eaton
Published By: Spredfast, Inc.     Published Date: Aug 30, 2011
In the Social Media Pocket Guide, discover best practices for developing full-scale programs. The guide outlines the business case, content strategy, real-world examples and measurement methods for the 6 best ways to use social media.
Tags : 
spredfast, social media management, social media strategy, social media planning, twitter, facebook, linkedin, youtube, flickr, social business, engagement, awareness, monitoring, spredfast, brand awareness, customer care, lead generation, social media objectives
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Aug 30, 2011
Learn how to plan and execute successful social media initiatives with this 28-page framework including best practices on developing your social media strategy, writing day-to-day content and managing your social media team.
Tags : 
spredfast, social media management, social media strategy, social media planning, twitter, facebook, linkedin, youtube, flickr, social business, engagement, awareness, monitoring
    
Spredfast, Inc.
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring, access control, network security appliance, data protection, vulnerability management
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then well look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: Quest Software     Published Date: Apr 27, 2012
Is your business reactively implementing compliance? You're wasting time and money - get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, enterprise applications, data management, data center
    
Quest Software
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, knowledge management, enterprise applications
    
Riverbed
Published By: Riverbed     Published Date: Jan 28, 2014
Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.
Tags : 
riverbed, cascade network performance management, application performance management, application performance issues, end-user experience monitoring, it visibility, deep component monitoring, network infrastructure, big data analytics, it efficiency, wan optimization technologies, it management, infrastructure, monitoring, network management, network performance, network performance management, application integration, business analytics, business integration
    
Riverbed
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.