it monitoring

Results 701 - 714 of 714Sort Results By: Published Date | Title | Company Name
Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager
    
GFI
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode, infrastructure, network performance
    
Jumpnode Systems
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture
    
Jumpnode Systems
Published By: Taridium     Published Date: May 22, 2007
By combining open source tools and open standards with best of breed hardware and software, taridium can offer one of the best price to performance ratios in the industry. Read how Taridium’s ipbx enterprise VoIP platform combines all the advantages of an open standards solution with the reliability of non-stop hardware, 7x24 monitoring and software support.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, phone, ip networks
    
Taridium
Published By: Taridium     Published Date: May 22, 2007
Taridium’s comms provider VoIP platform combines all the advantages of an open standards solution with the reliability of non-stop hardware, 7x24 monitoring and software support. Download this product summary and you’ll read why the comm’s platform is a true turn-key solution with fully integrated call rating and billing.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, phone, ip networks
    
Taridium
Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
    
AirDefense
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
AirDefense
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
    
AirDefense
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : 
fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency
    
WorldTelemetry, Inc.
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: iDirect     Published Date: Jan 29, 2007
With careful monitoring of competitors’ sites and reporting of any violations of search engine terms of service found, search engine results can in fact be directly affected. Learn how to identify your online competitors as well as common issues that can lead to reportable SEO violations.
Tags : 
search marketing, search engine optimization, seo, competitive analysis, seo firms, seo firm, competitors, competitor marketing
    
iDirect
Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security, enterprise level security, enterprise security, netiq
    
NetIQ Corporation
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.