Skip to main content
 

monitor

Results 1176 - 1200 of 1258Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper learn how a 100% accurate network monitoring and recording fabric can give you the application-level visibility you need to reduce MTTR and improve network uptime.
Tags : 
endace, architecture, high-speed, networks, high-speed networks
    
Endace
Published By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : 
endace, technology, white paper, network, network monitoring, network management, networks, reliability
    
Endace
Published By: Endace     Published Date: Nov 02, 2012
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it?
Tags : 
endace, network, monitoring, tools, saving, operations
    
Endace
Published By: IBM     Published Date: Apr 18, 2012
IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, technology platform
    
IBM
Published By: Splunk     Published Date: Oct 15, 2012
Real-time Monitoring and Auditing for Microsoft Windows Server Active Directory
Tags : 
splunk, windows server, it infrastructure, servers
    
Splunk
Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo
    
sweetiQ
Published By: Genesys     Published Date: Jun 11, 2013
Your new all-in-one contact center should include all of the tools needed to support efficient and effective customer service. Great contact center solutions allow you to do more with less; less IT time to deploy and monitor; less agent time to answer and resolve customer requests; and less administrator frustration as they try to adjust resources to meet operational demand.
Tags : 
contact centers, customer service, solution, technical, technology, drive business, voice, strategy
    
Genesys
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : 
netiq, service outages, monitoring strategy, system failure, single management view
    
NETIQ
Published By: ExtraHop     Published Date: Jul 25, 2013
Worried about application performance in the cloud? Real-time analysis of wire data provides you with deterministic application response times and detailed L7 metrics. This white paper explains how you can get the visibility you need to manage P2V migrations and cloud performance.
Tags : 
    
ExtraHop
Published By: ExtraHop     Published Date: Jul 29, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
virtual, applications, technology, network, web, vdi, database, storage
    
ExtraHop
Published By: Dell Software     Published Date: Apr 17, 2013
Approaches organizations take to manage application performance vary based on data collection, types of metrics captured and how these solutions are deployed and managed. TRAC Research surveyed more than 400 organizations on key areas of web and Application Performance Monitoring. See the results in this paper.
Tags : 
dell, transactin-centric, infra-centric, apm, trac research, application performance monitoring
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
Learn more about User Experience Monitoring and the need for advanced real-time predictive analytics to capture information and identify trends. Download this paper today and discover vital recommendations, including the need for better dialogue between IT and business and knowledge of end-user customer behavior.
Tags : 
user experience management, business impact, cornerstone, it transformation, end-user customer behavior, dell
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
Get a CIO’s View of Application Performance Monitoring In this white paper, learn more about the power and promise of application performance monitoring. See how you can elevate IT effectiveness to improve service delivery, resolve problems faster, and proactively meet business needs. Read this paper today.
Tags : 
cio, dell, application performance management, white papers, resolve problems faster, it effectiveness
    
Dell Software
Published By: IBM     Published Date: Sep 06, 2013
In this IBM security report, we will take a look at the data we've gathered through our monitoring operations and the security intelligence generated by our analysts and incident response teams who interpret that data. Our aim is to help you gain important insights into the current threat landscape - with a close look at the volume of attacks, the industries most impacted , the most prevalent types of attacks and attackers, and the key factors enabling them.
Tags : 
ibm, security services, cyber security intelligence, index, security report, security attacks, security protection, business security
    
IBM
Published By: Oracle     Published Date: Jul 05, 2017
Tornadoes and floods hitting the Midwest, mudslides and wildfires on the West Coast, hurricanes ravaging the Gulf Coast, and blizzards blanketing the Northeast are just a few of the natural disasters that can be incredibly frightening and damaging due to their unpredictable nature. They can hit anytime and anywhere.
Tags : 
data center preparedness, intelligent load balancing, dns time to live, monitoring, customer relations, roi
    
Oracle
Published By: Varonis     Published Date: Nov 12, 2013
The purpose of this document is to explain how Varonis products can help ease migration to Microsoft SharePoint, and how it can help keep data properly managed and protected once data has been moved.
Tags : 
varonis, sharepoint, sharepoint migrations, managing sharepoint content, protecting sharepoint content, project plan, sharepoint deployment, datadvantage
    
Varonis
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.