it monitoring

Results 676 - 700 of 714Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 18, 2012
IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, technology platform, server virtualization, project management
    
IBM
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Todays DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youre doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youre doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEMs diverse appeal, its values to IT, and Dells versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
Get a CIOs View of Application Performance Monitoring In this white paper, learn more about the power and promise of application performance monitoring. See how you can elevate IT effectiveness to improve service delivery, resolve problems faster, and proactively meet business needs. Read this paper today.
Tags : 
cio, dell, application performance management, white papers, resolve problems faster, it effectiveness
    
Dell Software
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security, data security, security intelligence index, security, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Published By: HP     Published Date: Apr 13, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc, it management, enterprise applications
    
HP
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, pci compliance
    
AlienVault
Published By: AppDynamics     Published Date: Feb 08, 2018
This eBook discusses the history of application performance testing, and with that backdrop, offers advice on combining performance testing and Application Performance Monitoring (APM) in the AWS cloud.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Feb 08, 2018
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If youre a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If youre an independent consultant, youll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But dont wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hitDownload our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, security, software development, it management, knowledge management, enterprise applications, platforms, storage, data management, it career advancement, data center
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management, it career advancement, data center
    
BitSight Technologies
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
When four of its hospitals needed to transition from manual to automated temperature monitoring, Allina Health sought a solution that would meet its core requirements: timely alerts to problems and automatic data capture for compliance reporting requirements. Ultimately, it was also looking for an enterprise solution that could form the standard for its entire health system. Read this case study to learn why Allina Health chose STANLEY Healthcares Wi-Fi-based AeroScout Environmental Monitoring solution, including MobileView software, as its system-wide standard to build an enterprise foundation for asset tracking, environmental monitoring, and other RTLS capabilities.
Tags : 
healthcare, medicine, asset tracking, environmental monitoring, rtls, hospital
    
STANLEY Healthcare
Published By: Microsoft Azure     Published Date: Apr 25, 2018
As you develop any app, database performance optimization is a critical consideration. Azure SQL Database, the intelligent cloud database from Microsoft, is designed to simplify your work as a developer and adapt to your workload so youre not left scrambling in pivotal moments. Read Intelligent Performance Optimization with Azure SQL Database for actionable ways to maximize the performance and optimization of your database at minimal cost. In this e-book, youll explore three perspectives on database performance: Dynamic resource scaling Database performance features Intelligent performance monitoring and tuning Get this free e-book today to ensure that your database has the resources it needs, makes the most of those resources, and constantly optimizes in the background for the best possible SQL performance.
Tags : 
    
Microsoft Azure
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.