About Sumtotal ActivitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Sumtotal Activities returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Business Activity Monitoring (BAM)
 •   Security Policies
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Technology Planning and Analysis
 •   Data Center Management
 •   Virtualization

Related Searches
 •   About Employee
 •   About Expense
 •   About Sumtotal Activities Functions
 •   About Sumtotal Activities Utility
 •   About Sumtotal Public
 •   About Sumtotal Purchase
 •   Commercial About Sumtotal
 •   Fast About Sumtotal
 •   Programming About Sumtotal Activities
 •   Trend About
Advertisement

ALL RESULTS
1 - 25 of 489 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Technology value matrix: Human Resources solutions by ComputerWeekly.com

October 19, 2012 - (Free Research)
Recent developments in programming languages and platforms made HR solutions more user friendly and easier to deploy and manage, says analyst Nucleus Research. 
(ANALYST REPORT) READ ABSTRACT |

Operational BI: Getting Real Time About Performance by SAP AG

December 28, 2007 - (Free Research)
This report provides a roadmap for the strategies and capabilities that Best-in-Class companies are employing to improve operational performance. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 01, 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 24, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 19, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Terrorist use of the internet by ComputerWeekly.com

May 23, 2014 - (Free Research)
Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats? 
(ESSENTIAL GUIDE) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 18, 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

Splunk for Business Intelligence by Splunk

April 03, 2012 - (Free Research)
This paper uncovers how Splunk can be applied to a variety of business intelligence (BI) activities to allow your company real-time insight. 
(WHITE PAPER) READ ABSTRACT |

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by ArcSight, an HP Company

June 15, 2010 - (Free Research)
This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Content Monitoring in the Enterprise by Lumension

January 04, 2013 - (Free Research)
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Evolution of Hosted Server Computing: The emerging ‘cloud’ alternative by ComputerWeekly.com

January 26, 2011 - (Free Research)
In this short paper, we look at the current state of play with regard to hosted infrastructure server offerings and activity, and consider where the market is going as we look forward. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Best Practices for vSphere Application Backups by Veeam Software

May 28, 2014 - (Free Research)
Explore this informative resource to learn about the top ten best practices for VMware vSphere Application backups as well as some smaller tips you might consider implementing in order to protect your virtual environment. 
(WHITE PAPER) READ ABSTRACT |

Garnering Executive Support: Building Your Business Plan for Strategic Meetings Management by StarCite

March 09, 2009 - (Free Research)
In this white paper, brought to you by StarCite, corporate travel and meetings professionals will learn why executive support is vital to a strategic meetings management effort and how to garner that support - even if it requires investment and resources from upper management. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 08, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

Building Relationship Capital: Client Relationship Management for the Capital Markets by Pivotal CRM, a CDC Software solution

January 24, 2011 - (Free Research)
Current market trends in investment banking research demand a rapid, sophisticated response, not just in terms of corporate strategy, but in the technologies to support these strategic moves. Learn how CRM technology helps capital-markets firms streamline investment-banking activities, increase brokerage trade volume and meet compliance challenges. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 21, 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

BPM Quarterly E-Zine: Business Process Management and Real-Time Analysis: Let the Real-Times Roll! by Metastorm

September 29, 2010 - (Free Research)
The world must optimize its use of water to avert conflict. Hectic Heathrow airport needs to streamline processes to continue to grow. Meanwhile, software architects must effectively enable BAM systems that take newly enabled BPM feeds. Data analytics are becoming part of the mix for more BPM scenarios. Find out more in our BPM quarterly. 
(EZINE) READ ABSTRACT |

Security Threat Report: 2010 by Sophos, Inc.

March 02, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: 2010 by Sophos UK

May 25, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(ANALYST REPORT) READ ABSTRACT |

Geographic Factors for Data Center Site Selection by FORTRUST LLC

November 2008 - (Free Research)
This paper highlights the geographic advantages inherent in establishing data center operations in Colorado, addressing major events and probabilities of natural disasters. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation

June 2012 - (Free Research)
In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM Intelligent Investigation Manager by IBM

March 2013 - (Free Research)
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases. 
(WEBCAST) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

What Auditors Think about Crypto by Thales

May 2011 - (Free Research)
Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 489 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts