Skip to main content
 

visibility

Results 1 - 25 of 866Sort Results By: Published Date | Title | Company Name
Published By: RelayHealth     Published Date: May 15, 2015
Today, healthcare providers need payment clarity – visibility into when and how much they will be paid, by whom, and the ability to better navigate the many obstacles to payment. To learn more, Download the new whitepaper from RelayHealth Financial.
Tags : 
    
RelayHealth
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
This infographic looks at Software Engineers who do awesome ops, ensuring millions of users having super-fast and reliable service from today’s massively complex systems! We look at the key skills and tools required in Modern monitoring and analytics: -Full Stack Visibility -Noise Reduction -Anomaly Detection -Modern Instrumentation -Data- Driven Insights Put your SRE Teams in the Driver's Seat with a new model for application monitoring.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Avi Networks     Published Date: Aug 17, 2018
This whitepaper details how ADCs and virtual appliances are inflexible, expensive, and lacking in visibility in contrast to the central management, autoscaling features, intelligent analytics, and flexibility offered by the Avi Vantage Platform. This document also outlines 7 key considerations that you should evaluate before you refresh your current load balancers: 1. Automation and Self-Service 2. Elasticity 3. Applica tion Analytics and Troubleshooting 4. Performance 5. Hybrid Cloud 6. Ecosystem Integrations 7. Total Cost of Ownership
Tags : 
    
Avi Networks
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Today’s brick and mortar retailers must tackle myriad challenges in an era of industry transformation, increased customer expectations and a highly-competitive landscape. The vast majority are facing these hurdles head-on, with particularly dogged efforts toward reaching omnichannel excellence: For example, according to Zebra Technologies’ 2017 Retail Vision Study, 90% of retailers plan to have an omnichannel practice in place by 2021, through options such as Buy Online, Pick Up in Store (BOPIS) or Click & Collect. It has become clear, however, that for these omnichannel efforts to succeed, inventory visibility and accuracy (ideally 90% or more, according to the Retail Vision Study) is more important than ever — to provide consumers with the easiest path to purchase and retailers with the most efficient way to fulfill. Accurate inventory is the foundation upon which all the other pillars of retail can be built, so retailers can react quickly and make smart decisions about their busines
Tags : 
    
Zebra Technologies
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : 
extensis, portfolio server, sql, asa, dam, digital asset management
    
Extensis
Published By: SurchSquad     Published Date: May 19, 2010
Register to speak with a professional SEO consultant about improving your site's search engine visibility. A consultant will follow-up to schedule your free, no-obligation consultation.
Tags : 
surchsquad, search engine, seo
    
SurchSquad
Published By: SurchSquad     Published Date: May 19, 2010
Register to speak with a professional SEO consultant about improving your site's search engine visibility. A consultant will follow-up to schedule your free, no-obligation consultation.
Tags : 
surchsquad, search engine, seo, consultant
    
SurchSquad
Published By: Bulwark     Published Date: Jul 23, 2018
In 2015, ANSI/ISEA 107 underwent an extensive overhaul. The new version merges ANSI/ISEA 107-2010 and ANSI/ISEA 207-2011 into a single document that considers all occupations faced with low-visibility hazards, including public safety workers. The changes outlined in the 2015 revision will impact wearers of high-visibility safety apparel (HSVA) across a wide range of industries including construction, oil and gas, and law enforcement, among others. Download the whitepaper to learn how the changes to ANSI/ISEA 107 affect your safety program.
Tags : 
    
Bulwark
Published By: eCompliance     Published Date: Jul 27, 2017
Check out our recent survey summary in a report entitled Participation Counts! A Look at Participation-Based Safety. The survey and its accompanying report, both sponsored by eCompliance®, provide insight into how safety professionals and their companies are encouraging employees to actively participate in safety initiatives in order to promote consistently safe behaviors on the job. The study was conducted in May of 2017 and illustrates the diverse opinions within the safety field regarding such issues as implementing behavior-based vs. participation-based programs, measuring safety participation, and management visibility into safety performance. The survey of over 500 respondents includes such findings as: • 15% of survey participants believe that behavior-based programs have a negative impact on safety culture, and 55% think participation-based safety is most effective. • The number one key initiative being prioritized by respondents in the next 12 months is “Improving communica
Tags : 
    
eCompliance
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Entry-level package options For organizations looking for protection with more basic functionality, we have three additional Umbrella packages designed for entry-level use cases.
Tags : 
performance, protection, enforcement, visibility, management, platform package exclusive
    
Cisco EMEA Tier 3 ABM
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.