monitoring tool

Results 76 - 100 of 102Sort Results By: Published Date | Title | Company Name
By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
     Centrify Corporation
By: VSS Monitoring     Published Date: Jun 17, 2014
Read this Solution Guide to learn how to optimize monitoring & security for 40G & 100G networks While network owners are migrating to 40G & 100G infrastructures, most tools available today cannot ingest high-speed traffic. They lack both the physical interfaces and processing power to do so.
Tags : vss monitoring, bandwidth, network, infrastructure, 40g, 100g, interface, networking
     VSS Monitoring
By: FireScope, Inc.     Published Date: Dec 06, 2010
Take the FireScope Challenge - download a free 28-day trial of FireScope Dash and compare the speed, breadth of monitoring and ease of use against your current monitoring tools.
Tags : firescope dash, dashboard free trial download, monitoring tool, snmp, syslog, vmware api integration, user experience testing, infrastructure
     FireScope, Inc.
By: Sysomos     Published Date: Oct 24, 2012
The fast food business is worth more than $200 billion. This report digs into social media conversations to discover who's winning the burger wars. Includes social media ratings for Burger King, McDonald's, KFC, and Taco Bell.
Tags : sysomos, heartbeat, map, social media monitoring tools, business intelligence, analysis, analytics, dashboard
     Sysomos
By: Sysomos     Published Date: Oct 24, 2012
Leading brands use social media to attract and nurture brand evangelists, to generate leads and make sales, and much more. Here are 8 tips that Sysomos recommends for building your brand with social media.
Tags : social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment
     Sysomos
By: Sysomos     Published Date: Oct 24, 2012
Getting the right people excited about your brand is a powerful way to increase brand awareness and make sales. But how do attract influencers and get them talking about you? Here are 6 tips from Sysomos.
Tags : social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, trends, assessment
     Sysomos
By: uptime software     Published Date: Dec 06, 2007
Discover the three key reasons how enterprise IT dashboards can deliver highly valuable information to your organization in an easy to use format and provide simple processes that will turn dashboard data into actionable IT decisions.
Tags : server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure
     uptime software
By: uptime software     Published Date: Dec 06, 2007
Monitoring servers, applications, and services has become an essential part of the IT department over the past 10 years. However, it can be a daunting task to find the right solution for your Enterprise. This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company's needs, the metrics you need, your budget range, your resource availability, and your management's reporting needs.
Tags : server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure
     uptime software
By: Viavi Solutions     Published Date: Aug 05, 2015
The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.
Tags : apm, security, hacking, performance monitoring
     Viavi Solutions
By: Viavi Solutions     Published Date: Aug 05, 2015
With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.
Tags : apm, security, hacking, performance monitoring
     Viavi Solutions
By: Oracle     Published Date: Jan 07, 2014
A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
Tags : socially enabled enterprise, social business, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience
     Oracle
By: Oracle     Published Date: Jan 13, 2014
Oracle, Leader Networks, and Social Media Today recently conducted an online survey of over 900 marketing and technology leaders at more than 500 organizations from around the world to explore what it means to be a socially enabled enterprise. Technology and Marketing executives from Chubb & Son, Shell and Whole Foods Market participated in in-depth interviews as part of the study and share lessons learned and provide practical insights from their perspective. Paul Gillin, veteran technology journalist and co-author of the bookAttack of the Customers, adds perspective based on his experience with applying social media to marketing, customer service and internal communications Download this exclusive White Paper, The Socially Enabled Enterprise to learn more about the opportunities and challenges global organizations are facing in the transition to becoming socially enabled enterprises.
Tags : socially enabled enterprise, social business, social media monitoring, social marketing, social media management, social relationship management, social marketing platform, social marketing tools
     Oracle
By: HP     Published Date: Apr 13, 2014
Deliver game-changing uptime. Read how Playtech, the world’s largest publicly-traded online gaming software supplier, achieves 99.999% uptime and detects and fixes issues in minutes versus hours with comprehensive IT monitoring tools.
Tags : bpm, bsm, business process monitor, business service management, hp it performance suite, it case study, it infrastructure, omi
     HP
By: Yottaa, Inc.     Published Date: May 09, 2014
Most sites aspire to faster page load times. But in order to improve, you first need goals based on real data. Only robust performance benchmarking will tell you how your user experience stacks up against competitors, and how performance varies in all the regions you sell to. This guide presents 9 key tips to ensure you get actionable insights from benchmarking performance against competitors, including common oversights and best practices. The guide also links to free tools that can help you to accomplish your benchmarking project. Download the eBook here!
Tags : benchmarking, performance monitoring, website testing, page load time, web performance, optimization, testing tools, free tools
     Yottaa, Inc.
By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection
     Viavi Solutions
By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
     AlienVault
By: IBM     Published Date: Aug 21, 2009
Find out how the standards-based modeling, monitoring, connectivity, and process integration tools that comprise IBM's Process Integration suite are allowing companies to implement process automation components with greater speed and agility than ever before. Download this informative white paper to learn more.
Tags : soa, web services, service-oriented architecture, service oriented architecture, bpm, business process management, ibm
     IBM
By: Quocirca     Published Date: Apr 08, 2009
Monitoring, measuring and reporting on the financial health of an organisation is a basic need that requires effective tools and processes to optimise the end result. Underpinning this is the requirement for planning capabilities, utilising scenario and what if analysis with simulations and other forward looking capabilities. The new primary research presented in this report shows that most organisations still have much to do.
Tags : quocirca, oracle, monitoring, measuring, reporting, financial health, compliance, epm
     Quocirca
By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : endace, technology, white paper, network, network monitoring, network management, networks, reliability
     Endace
By: Endace     Published Date: Nov 02, 2012
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it?
Tags : endace, network, monitoring, tools, saving, operations
     Endace
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com