Skip to main content
 

monitor

Results 151 - 175 of 1258Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
Die Application Economy hat sich fest etabliert, denn mittlerweile hängt unser gesamtes Leben von vernetzten Anwendungen ab, die auf einer Vielzahl unterschiedlicher Geräte und Systeme und in On-Premise- wie auch Cloud-basierten Infrastrukturen laufen.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
in der modernen application Economy hängt der markterfolg immer stärker von der Fähigkeit eines unternehmens ab, multi-Channel-anwendungen mit hervorragender und einzigartiger Customer Experience bereitzustellen. um die dafür erforderlichen Service Levels zu halten, müssen sich it-teams zu einem proaktiven it-monitoring hin bewegen. Dieses White Paper gibt einen Überblick über die Hauptanforderungen, die erfüllt sein müssen, damit it-teams effektive, proaktive monitoringfunktionen einrichten können.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
CA Unified Infrastructure Management (CA UIM) ist die einzige Lösung, die einheitliche Analysen bereitstellt, um Probleme proaktiv zu lösen. Die Architektur der Lösung besteht aus einer einzelnen Plattform, die die Infrastruktur umfassend abdeckt. So können Sie hybride IT-Umgebungen optimal managen und die Anforderungen des agilen IT-Betriebs erfüllen.
Tags : 
    
CA Technologies EMEA
Published By: New Relic     Published Date: Apr 07, 2015
This white paper will help you understand how you can achieve end-to-end visibility into application performance no matter where your application or parts of your application are running. You’ll learn what to look for when choosing an application performance monitoring solution and we’ll share some lessons learned about monitoring applications in the cloud.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
The hybrid cloud model-combining public cloud services with private (on-premises) resources-is increasingly gaining traction in companies both big and small. But in order to reap its benefits, organizations will first have to solve the complex monitoring problem. The good news: a simple solution exists!
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
Whether you’ve already moved to the Cloud or are getting ready to migrate, this document will walk you through everything you need to start improving the performance of your Azure applications with New Relic. From instructions to get started, a basic feature overview, to Azure monitoring best practices, this guide is full of useful information for New Relic newbies.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
At Zendesk, they see using New Relic and Rackspace® solutions as a winning combination. New Relic allows them to understand the performance characteristics of their application, to monitor performance and quickly drill down to find and resolve issues. Additionally, New Relic shows Zendesk how their application interacts with the Rackspace infrastructure underpinnings so they can achieve the most effective and efficient use of their hosting environment. Together the Rackspace hosting environment and the New Relic application performance tool creates a foundation for SaaS application success. In turn, this frees up the Zendesk team to work on application features.
Tags : 
    
New Relic
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
According to Mary Johnston Turner, Research Vice President at IDC; "Breaking down technology specific management as well as data silos also facilitates faster infrastructure and application rollouts, reduces human errors, and improves overall business agility.Cloud based management, monitoring and analytics help to improve collaboration between IT operations and developer teams by stabilizing service levels and monitoring usage to support accurate charge back." 
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : 
digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data, intagible assets
    
Oracle
Published By: WNS     Published Date: Jun 21, 2017
Pricing needs to support a brand’s overall marketing platform. But is that enough to assure consistency of message throughout the organization? Given the far-reaching influence a price position has on a brand, and how various departments need to be aligned to support that position, an argument can be made for treating pricing as a core competency within the organization. What does this mean in real terms? Pricing is a day-to-day concern for numerous departments throughout the organization. While marketing might use pricing tactics to grow market share, sales teams chase volume goals, and product development teams lose sleep over the price image each product projects.
Tags : 
profitability, opportunity identification, monitoring and refinement, executive access, own price elasticity, cross price elasticities, price corridors
    
WNS
Published By: AppDynamics     Published Date: Sep 20, 2017
DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles.
Tags : 
cio, delivers software, business, metrics, automation, digital transformation, appdynamics
    
AppDynamics
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how digital technology is integrating real-time monitoring of pump energy usage, maintenance, and operations for maximum payback.
Tags : 
pump, tco, water
    
Schneider Electric
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Agile development teams and IT operations teams often become so consumed with their own daily challenges that collaboration between them is severely lacking or non-existent. The problem with this is that manageability requirements become an afterthought to the development process, and agile teams may roll out applications that IT ops can't effectively monitor and run. While enabling cross-team collaboration is mutually beneficial— and ultimately improves the business' bottom line—, implementing it requires some effort at the organizational level to instill changes, and the right tools will help. Read this white paper to learn guidelines for adapting your application development and management model to enable Dev/Ops information sharing and collaboration, and learn how the cloud can be leveraged for this purpose.
Tags : 
developers, ops, collaboration, cloud
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Storage infrastructure performance monitoring and management is the key to business continuity and availability solutions. To ensure application performance, storage managers must manage the performance of the array and the SAN based on the array. HP Storage Essentials software delivers a solution for these scenarios. This solution brief addresses how current performance management challenges can be resolved with HP Storage Essentials software.
Tags : 
performance management, hp storage essentials, software, san, infrastructure
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: Idera     Published Date: Nov 08, 2013
SQL Diagnostic Manager: Download Trial Today
Tags : 
idera, sql diagnostic, free trial, download software, performance monitoring, query monitoring, history browsing, predictive alerting
    
Idera
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.