it monitoring

Results 651 - 675 of 714Sort Results By: Published Date | Title | Company Name
Published By: Polystar     Published Date: Aug 31, 2010
This article describes the problems of monitoring modern 10Gbps telecom networks and some of the solutions.
Tags : 
polystar, 10gbps, network monitoring, business intelligence
    
Polystar
Published By: World Data Products, Inc.     Published Date: Oct 04, 2010
This three section white paper explains strategies on how to develop, apply, and maintain a security program.
Tags : 
world data products, secure network, security policies, monitoring and testing, monitoring, network security, test and measurement, storage management
    
World Data Products, Inc.
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
Lumension
Published By: EventTracker     Published Date: Nov 22, 2010
Ten conditions in Windows to monitor to make your organization more secure, and suffer less operational impact due to unplanned outages.
Tags : 
windows, log management, siem, file changes, registry changes, compliance, software compliance, sarbanes oxley compliance
    
EventTracker
Published By: N-able     Published Date: Nov 23, 2010
IT Service Delivery: From Basic Automation through to Managed Services
Tags : 
it automation, network monitoring, remote desktop, network management, msp, managed services software, productivity, service management
    
N-able
Published By: AVIDwireless     Published Date: Dec 10, 2010
A look at environmental monitoring in a Connected World, using wireless remote monitoring and control
Tags : 
wireless environmental monitoring, m2m, connected world, wireless sensors, wireless m2m, wireless remote monitoring and control
    
AVIDwireless
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc
    
NetIQ
Published By: MKAdvantage     Published Date: Feb 03, 2011
This paper describes some best practices around how to gather requirements for an upcoming ITSM project
Tags : 
itsm assessment, itsm requirements, itsm planning, monitoring and management, itil, service management
    
MKAdvantage
Published By: RM Global     Published Date: Feb 22, 2011
A new raised floor panel category for high security data centers and SCIF requiring real-time preemptive under floor security monitoring.
Tags : 
data center, raised floor, data center security, scif, computer room, glass floor panels, raised floor glass panels, glass floor
    
RM Global
Published By: Right First Time Contact Centre     Published Date: Mar 12, 2011
Examines how call recording-based quality monitoring can be improved with the addition of IVR Surveys
Tags : 
ivr surveys, fcr, first contact resolution, customer research, contact center, contact centre
    
Right First Time Contact Centre
Published By: Trillium Software     Published Date: Jun 06, 2011
The second Web seminar in the series is titled "Data Governance". Learn how Digital River successfully implemented Data Governance across their organization.
Tags : 
trillium software, operational data quality, upstream operational systems, data governance, data monitoring, businessprocesses, digital river, data management
    
Trillium Software
Published By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : 
ibm, guardium, database, audit, security, risk, monitoring, webcast
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, application security
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, webcast
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper learn how a 100% accurate network monitoring and recording fabric can give you the application-level visibility you need to reduce MTTR and improve network uptime.
Tags : 
endace, architecture, high-speed, networks, high-speed networks
    
Endace
Published By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : 
endace, technology, white paper, network, network monitoring, network management, networks, reliability
    
Endace
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.