Skip to content
 

monitor

Results 1 - 25 of 1138Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : 
case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
    
Cohesity
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 27, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
Published By: ServiceNow     Published Date: Sep 18, 2018
When a global transportation logistics provider wanted to improve support for its global network of branch offices in the Americas, Europe, and Asia, it used performance analytics to monitor and analyze the organization’s support processes. Not only did performance analytics dramatically increase visibility—allowing the company to move from monthly reports to on-demand performance dashboards—it also uncovered major process bottlenecks. In one case, resolving a single bottleneck increased efficiency by 17%, making support far more responsive while saving hundreds of hours of effort. Discover how ServiceNow Performance Analytics can benefit your business by downloading this white paper.
Tags : 
performance, analytics, business, servicenow
    
ServiceNow
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software EMEA
Published By: Panduit     Published Date: Oct 09, 2018
Interested in learning how to stabilize costs and promote growth for you and your tenants? Download the Panduit white paper Colocation Provider Strategies for Success to learn how you can enable ongoing monitoring and maximize your colo data center’s efficiency.
Tags : 
panduit, colocation, data center management, network monitoring
    
Panduit
Published By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : 
dataflow, operations, factory, industrial
    
StreamSets
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
Cylance
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: SAS     Published Date: Aug 13, 2018
You may know some data management basics, but are you aware of the transformational results that can result from doing data management right? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : 
online, capacity, security, website monitoring, performance
    
HP AppPulse Mobile
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 05, 2018
Miercom č stata incaricata da Cisco Systems di configurare, far funzionare e quindi valutare in modo indipendente le infrastrutture di rete per campus wireless e cablate di Cisco Systems e Huawei Technologies. I prodotti di ciascun fornitore sono stati configurati e implementati rigorosamente secondo i progetti consigliati dai fornitori e utilizzando il loro rispettivo software per la gestione, il controllo, la configurazione e il monitoraggio della rete in tutto il campus.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Cisco     Published Date: Dec 04, 2015
What happens when you swap employees’ monitors and phones with new Cisco DX80 collaboration tools? What happens when you take them away? Watch their reactions
Tags : 
cisco, dx80, mobile, employee phone
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Cisco Catalyst 2960-X and -XR Series Switches earned the Miercom Certified Green Award for saving over 50% in annual energy operating costs compared to the industry average. The switches were evaluated in accordance with the Miercom Certified Green Testing Methodology. Test results show the benefits of Cisco Catalyst 2960-X and -XR Series Switches.
Tags : 
catalyst, lab testing, switch models, monitored, power consumption, power efficiency, environmental impact, energy costs
    
Cisco
Published By: Dell EMC     Published Date: May 21, 2018
Office technology continues to become ever more powerful, versatile, and efficient, including display technology, which has made incredible strides in performance, functionality, agility, precision, and color. Dell is at the forefront of this rapid evolution of high-performance displays with innovative, award-winning monitors with a wide range of sizes, features, and price points.
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.