it monitoring

Results 201 - 225 of 720Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam, anti spyware, anti virus, ddos, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management
    
McAfee
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security, auditing, security management, business activity monitoring, database development, database security
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
    
IBM Corporation
Published By: StreamSets     Published Date: Dec 05, 2018
Enterprise analytics is quickly evolving into a democratized capability where anyone can access and act on all available information, often in real-time employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration. This paper proposes that DataOps, the application of DevOps practices to data analytics, is the best way to overcome these challenges to create an iterative build-operate process for data movement. Read this white paper to: Understand how modern data analytics create data integration challenges due to architectural complexity, operational blindness and data drift. Learn how DevOps pillars of automation and monitoring can create higher developer productivity, operational efficiency and business confidence in data. See specific examples of DataOps functionality being applied to data integration across modern architectures.
Tags : 
    
StreamSets
Published By: Datastax     Published Date: Apr 04, 2017
For the new or veteran Database Administrator (DBA): As a DBA, perhaps you’ve seen database engines such as object-oriented and OLAP databases come and go, and you’re wondering why NoSQL should be any different. You may ask questions like: What kinds of administration and management work does NoSQL entail? How are security, backup and recovery, database monitoring and tuning handled? How do I create databases, objects, and read/write data without SQL? Learn what NoSQL is, why it’s needed, and when it’s not.
Tags : 
dba, nosql, olap, datastax
    
Datastax
Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
IBM
Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
Plötzlich ist das Netzwerk wieder angesagt. Technische Trends wie das Internet of Things, softwaredefiniertes Networking und wachsende End User-Erwartungen führen zu einer Nachfrage nach ungestörter Performance und Zuverlässigkeit des Netzwerks. Die Datenmengen werden zunehmend größer, und Unternehmen können ihre geschäftlichen Ziele nur noch mit mehreren Clouds erreichen. Wie kann das Netzwerk in dieser Situation Schritt halten und auch noch die künftigen Anforderungen erfüllen? In diesem eBook werden die Trends analysiert, die das Unternehmensnetzwerk beeinflussen – das moderne Netzwerk. Zudem werden die damit für NetOps-Experten verbundenen Probleme und Maßnahmen von Unternehmen zur Vorbereitung auf die Zukunft behandelt.
Tags : 
    
CA Technologies EMEA
Published By: SpectorSoft     Published Date: Dec 12, 2013
Detect Critical Network Events with Proactive Server Monitoring
Tags : 
spectorsoft, free trial, event logs, critical network events
    
SpectorSoft
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
    
SAS
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Effortlessly manage your fleet of thermal barcode printers for tighter control and greater outcomes. This paper covers challenges like problematic provisioning, security headaches and muddled monitoring.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data, security, access control, encryption, intrusion detection
    
ArcSight
Published By: Schneider Electric     Published Date: Nov 17, 2016
Today’s data center power and cooling infrastructure has roughly 3 times more data points / notifications than it did 10 years ago. Traditional data center remote monitoring services have been available for over 10 years but were not designed to support this amount of data monitoring and the associated alarms, let alone extract value from the data. This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
schneider electric, digital remote monitoring, data center operations, maintenance, enterprise applications, infrastructure
    
Schneider Electric
Published By: Schneider Electric     Published Date: Apr 20, 2018
This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
digital remote monitoring, big data, machine learning, data center
    
Schneider Electric
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security, it management, data management, data center
    
McAfee
Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk, remote management, remote network management, system management software
    
CCSS
Published By: Unitrends     Published Date: Aug 18, 2015
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or, if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users? This white paper is to help you understand the various approaches to deduplication, the strengths and weaknesses of each, and to introduce a different approach to deduplication, Adaptive Deduplication.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, dedupe, it management, data management, data center
    
Unitrends
Published By: Unitrends     Published Date: Apr 12, 2010
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users?
Tags : 
unitrends, backup, data protection, data quality, server, replication, lossless, lossy, data compression, backup and recovery, storage area networks, storage management, storage virtualization, encryption, database development
    
Unitrends
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : 
devops, devops tools, continuous delivery, devops methodology
    
Splunk
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle, tomcat, java ee, virtualization, multiple platforms, platform-as-a-service, paas, developer productivity, maven, hudson, production support, production maintenance, cloud architecture
    
Red Hat, Inc.
Published By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.