Skip to main content
 

monitor

Results 1 - 25 of 1154Sort Results By: Published Date | Title | Company Name
Published By: Gallagher Integrated     Published Date: Jun 29, 2016
Boards have a duty to see that hospitals and health systems comply with all state and federal laws and regulations, but they generally delegate responsibility for establishing, managing, and monitoring compliance programs to management. They also have a fiduciary responsibility to see that charitable assets are used appropriately.
Tags : 
    
Gallagher Integrated
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 27, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software EMEA
Published By: Panduit     Published Date: Oct 09, 2018
Interested in learning how to stabilize costs and promote growth for you and your tenants? Download the Panduit white paper Colocation Provider Strategies for Success to learn how you can enable ongoing monitoring and maximize your colo data center’s efficiency.
Tags : 
panduit, colocation, data center management, network monitoring
    
Panduit
Published By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : 
dataflow, operations, factory, industrial
    
StreamSets
Published By: Uberall     Published Date: Oct 08, 2018
Research shows that today’s in-store purchases tend to begin and end online. Even ready-tobuy consumers research online for nearby stores, go in-store to buy, and often leave a review about their experience. In turn, those reviews influence the purchasing decisions of your future customers. This makes it crucial for businesses to have a voice in those conversations, monitoring and responding to reviews and comments.
Tags : 
customer, store, consumer, business, read-to-buy, local marketing, reputation management
    
Uberall
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: Amazon Web Services     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Oct 31, 2018
Watch this webinar to learn how a financial services organization uses a simple, comprehensive data governance solution from Dataguise to discover, protect, and monitor sensitive personal data in real time across all its Amazon Web Services (AWS) data repositories, and to prepare for GDPR compliance.
Tags : 
financial, services, organization, gdpr
    
Amazon Web Services
Published By: Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
Cylance
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: SAS     Published Date: Aug 13, 2018
You may know some data management basics, but are you aware of the transformational results that can result from doing data management right? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: Blackline GPS     Published Date: Mar 05, 2013
Are you taking the proper precautions in identifying hazards for lone workers and reducing their risk for injury? If not, your workers could suffer delays in emergency response or medical assistance. Stay in compliance and help keep your employees safe with this Free Best Practices Report.
Tags : 
safety, lone workers, remote workers, compliance, best practices, white paper, blackline gps
    
Blackline GPS
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Published By: PeopleDoc     Published Date: Apr 13, 2016
Managing talent and how that talent performs is a high-stakes arena that takes up a lot of time and resources. How are your competitors tackling these issues? Every HR department is trying to find more efficient ways to provide service to employees, from answering routine requests to dealing with complaints and whistleblowing. For efficiency, employee satisfaction, and legal compliance, it’s important to track, monitor, and respond to all these employee actions. The consequences of having complaints and allegations fall through the cracks are two-fold: employees feel ignored, and lawsuits become more likely and harder to defend. As a result, many organizations are buying or building systems to manage this important tracking process. To find out who’s doing what and what’s working in the real world, BLR conducted a Case Management Survey in February 2016. Download the summary to see the results!
Tags : 
    
PeopleDoc
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.