monitor

Results 1 - 25 of 1250Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability of your file transfer operations in order to deliver exceptional customer experiences. You’ll learn why it’s critical to: • Make data visible where it is in the network • Reduce or eliminate ad hoc use of FTP • Build scalability into your file transfer system • Monitor data transfers from beginning to end
Tags : 
    
Group M_IBM Q4'19
Published By: Alert Logic     Published Date: Oct 25, 2019
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host. Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include: • Planning for maximum portability • Setting permissions for users and system resources • Creating an action plan based on log monitoring and IDS data
Tags : 
    
Alert Logic
Published By: TIBCO Software     Published Date: Sep 16, 2019
Lo que aprenderá: • Aplicar la analítica avanzada y las técnicas de machine learning / IA a fin de optimizar procesos de manufactura complejos • De qué manera el control de procesos estadísticos de múltiples variantes puede ayudar a detectar las desviaciones en una base de referencia • Cómo monitorear el OEE en tiempo real y producir una vista de 360 grados de su fábrica Asimismo, el webinar también da cuenta de los casos de estudio de nuestros clientes que ya han implementado con éxito los modelos de optimización de procesos.
Tags : 
    
TIBCO Software
Published By: Workday     Published Date: Oct 22, 2019
Data Driven One system for HR can help you boost employee engagement, analyze data more easily, and monitor and ensure diversity. How does it work? It’s all in the data. Read this report to learn today’s HR trends and how you can use data to improve every aspect of the employee experience.
Tags : 
    
Workday
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience
    
ASG Software Solutions
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : 
online, capacity, security, website monitoring, performance
    
HP AppPulse Mobile
Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Managing infrastructure has always brought frustration, headaches, and wasted time. That’s because IT professionals have to spend their days, nights, and weekends dealing with problems and manually tuning their infrastructure. Traditional monitoring and support are too far removed from infrastructure, resulting in an endless cycle of break-fix-tune-repeat. Infrastructure powered by artificial intelligence, however, can overcome the limitations of humans and traditional tools. This white paper explores how HPE InfoSight with its recommendation engine paves the path for an autonomous data center your Hybrid Cloud World.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Jun 05, 2018
Miercom è stata incaricata da Cisco Systems di configurare, far funzionare e quindi valutare in modo indipendente le infrastrutture di rete per campus wireless e cablate di Cisco Systems e Huawei Technologies. I prodotti di ciascun fornitore sono stati configurati e implementati rigorosamente secondo i progetti consigliati dai fornitori e utilizzando il loro rispettivo software per la gestione, il controllo, la configurazione e il monitoraggio della rete in tutto il campus.
Tags : 
    
Cisco EMEA
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Cisco     Published Date: Dec 04, 2015
What happens when you swap employees’ monitors and phones with new Cisco DX80 collaboration tools? What happens when you take them away? Watch their reactions
Tags : 
cisco, dx80, mobile, employee phone
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Cisco Catalyst 2960-X and -XR Series Switches earned the Miercom Certified Green Award for saving over 50% in annual energy operating costs compared to the industry average. The switches were evaluated in accordance with the Miercom Certified Green Testing Methodology. Test results show the benefits of Cisco Catalyst 2960-X and -XR Series Switches.
Tags : 
catalyst, lab testing, switch models, monitored, power consumption, power efficiency, environmental impact, energy costs
    
Cisco
Published By: Dell EMC     Published Date: May 21, 2018
Office technology continues to become ever more powerful, versatile, and efficient, including display technology, which has made incredible strides in performance, functionality, agility, precision, and color. Dell is at the forefront of this rapid evolution of high-performance displays with innovative, award-winning monitors with a wide range of sizes, features, and price points.
Tags : 
    
Dell EMC
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: • Mobile devices, tablets, and interactive technology improve the patient experience • Healthcare facilities can remotely monitor patient progress and health post-discharge • Providers can leverage patient portals and other tools to promote population health • Ensuring patient engagement success requires effective measurement • And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care
    
Lenovo and Intel®
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
6-Nines is a standard benefit of being our customer. That’s why this is a cost-nothing, do-nothing different guarantee. • Applicable on all models and configurations • Automatic on new arrays and on existing arrays with a support renewal • Guaranteed for as long as the product is supported HPE InfoSight monitors your uptime and if you experience less than 99.9999% availability, we’ll work with you to resolve the issue and provide support credit(s) at no cost
Tags : 
    
Hewlett Packard Enterprise
Published By: HotSchedules     Published Date: Jul 28, 2017
Manage costs, increase sales. At a basic, financial level, these are the pillars of every successful restaurant operation. Here, we break down the prime cost calculation. Monitor this calculation every week and you'll breakthrough your break-even plateau and increase your restaurant’s profits.
Tags : 
prime cost, retail success, restaurant growth, sales increase, cost management
    
HotSchedules
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: