Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

service monitoring

Results 1 - 25 of 152Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: May 14, 2019
Learn how ServiceNow Event Management uses AIOps to dramatically improve business service availability and performance by mapping business services with accurate service context, intelligently analyzing events, integrating existing monitoring and event management tools, and reducing event volumes.
Tags : 
    
ServiceNow
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications
    
CA Technologies
Published By: Riverbed     Published Date: Jul 17, 2013
Highly complex IT environment with multi-tier application architectures delivering apps and services, detecting and diagnosing code level performance problems can be like looking for a needle in a haystack. While it may be plain to the end user that there is a problem, understanding where that problem originates and exactly what is causing it is difficult, and time consuming. Riverbed OPNET AppInternals Xpert addresses this challenge by combining end-user experience, transaction tracing, and application component monitoring for deep end-to-end application visibility. This latest release facilitates bi-directional workflows between operations and application development to expedite problem resolution. Register to read the full report.
Tags : 
apm, esg, big data, end-user experience, application visability
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : 
analytics, big data, forrester
    
Riverbed
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : 
lan, voip, business communication, wan, pbx, networking, wireless, telecom
    
RCN Business
Published By: Aternity     Published Date: Feb 24, 2016
In this brief, the focus will be on how companies are relying on more mobile applications to run their businesses. As these mobile applications become more important, it is critical for companies to ensure a quality mobile user experience in order to deliver quality service to ensure customer satisfaction and brand loyalty. A unified approach to mobile end user experience monitoring is the proven way enterprises can ensure this quality user experience.
Tags : 
aternity, mobile strategy, mobile apm, unified monitoring, mobile applications, brand loyalty, it management, enterprise applications
    
Aternity
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: Reputation.com     Published Date: Jun 20, 2016
Online reviews play a vital role in the reputation and financial success of your company. Reviews can influence whether consumers buy your products or services or your competitor's. What's more, they also have an effect on your ability to attract new patients. As a marketing professional, one of the single most important things you can do for your company is develop an online review generation and monitoring program.
Tags : 
    
Reputation.com
Published By: CA Technologies     Published Date: Nov 02, 2016
Since Aternity was founded in 2005, the business world has changed dramatically. Mobile devices, software as a service (SaaS) and the cloud have taken up permanent residence in today’s enterprise IT department. Aternity stays on the cutting edge by rapidly delivering innovative End User Experience Monitoring solutions that can monitor any application on any device—physical, virtual or mobile—for any user.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
In today’s application economy, market success is increasingly being defined by an organization’s ability to deliver multi-channel applications that provide an exceptional and differentiated customer experience. To deliver the service levels required, IT teams need to move to establish proactive IT monitoring approaches. This white paper offers an overview of the key requirements that must be met for IT teams to establish effective proactive monitoring capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
This infographic looks at Software Engineers who do awesome ops, ensuring millions of users having super-fast and reliable service from today’s massively complex systems! We look at the key skills and tools required in Modern monitoring and analytics: -Full Stack Visibility -Noise Reduction -Anomaly Detection -Modern Instrumentation -Data- Driven Insights Put your SRE Teams in the Driver's Seat with a new model for application monitoring.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
SD-WAN ist aktuell die wichtigste Technologie für softwaredefiniertes Networking (SDN). Sie ermöglicht eine höhere Anwendungsperformance, besseren Zugriff auf Cloud-Services und geringere Betriebskosten. Werden diese Ziele mit Ihrer aktuellen Netzwerk-Monitoring-Strategie wirklich erreicht?
Tags : 
    
CA Technologies EMEA
Published By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
    
SambaSaftey
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.