Activity VendorWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Activity Vendor returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Business Activity Monitoring (BAM)
 •   Business Intelligence Solutions
 •   Business Planning
 •   Data Security
 •   Operational BI
 •   Security Policies
 •   Security Monitoring
 •   Database Administration
 •   Network Security

Related Searches
 •   Activity Consultancy
 •   Activity Vendor Arkansas
 •   Activity Vendor B2C
 •   Activity Vendor Cycles
 •   Activity Vendor Policies
 •   Activity Vendor Usa
 •   All Activity Vendor
 •   Manufacturer Activity Vendor
 •   On-Line Activity
 •   Source Activity Vendor
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Smart Process Applications Evaluation, Q2 2013 by OpenText

April 24, 2013 - (Free Research)
This Forrester Wave report aims to help CIOs find the right smart process app vendor partners for improving this full spectrum of human-based processes. Read today to explore Forrester's key takeaways after conducting a 15-criteria evaluation of twelve software vendors. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 10, 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 19, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 24, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

World-Class EA: The Agile Enterprise by ComputerWeekly.com

February 11, 2013 - (Free Research)
Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Best Practices in eCatalog Management by Ariba, Inc.

June 11, 2010 - (Free Research)
At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized. 
(WHITE PAPER) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 22, 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 17, 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Web Lead Evaluation and Scoring Study by KnowledgeStorm, Inc (E-mail this company)

April 06, 2006 - (Free Research)
KnowledgeStorm and The Artemis Group conducted an in-depth analysis of 15,452 Web leads generated by KnowledgeStorm. The objective of this study was to identify characteristics of Web leads that maximize sales opportunities and to debunk myths around what makes a good sales lead. 
(WHITE PAPER) READ ABSTRACT |

Analyst's take: Independent software vendors save money with DataDirect drivers by ComputerWeekly.com

March 02, 2011 - (Free Research)
Independent software vendors (ISVs) that embed DataDirect drivers can leverage DataDirect’s expertise to improve data connectivity.  Using DataDirect helps them reduce cost and risk so they can focus on innovation and competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

The Forrester Wave™: Enterprise Service Bus, Q2 2011 by Red Hat

April 25, 2011 - (Free Research)
Over the course of 2010 and 2011, Forrester Research spoke to hundreds of customers about their enterprise service bus (ESB) activities, and conducted briefings and demonstration reviews as well as over twenty customer interviews to evaluate five commercial and four open source ESB product vendors. Access this paper to examine Forrester's findings. 
(ANALYST REPORT) READ ABSTRACT |

Prepare For Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions by IBM

December 07, 2010 - (Free Research)
Read on to learn how effective software asset management can support both cost effectiveness and cost efficiency through automation and by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing. 
(WHITE PAPER) READ ABSTRACT |

Gartner 2013 Magic Quadrant for Security Information and Event Management Report by Hewlett-Packard Limited

December 31, 2013 - (Free Research)
This analysis report measures the adoption of SIEM technology pertaining to specific vendors. 
(ANALYST REPORT) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 20, 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Making Predictive Analytics Pervasive: Deployment Trends by SearchBusinessAnalytics

May 12, 2014 - (Free Research)
This report examines how the market acceptance of predictive analytics has changed during the past eight years and provides details on implementation status, value, users, vendors and more. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Integrating Virtual-Aware Security Technologies by Intel

August 24, 2011 - (Free Research)
There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Big Data Analytics and The New Era of Data Warehousing by Information Builders

December 05, 2011 - (Free Research)
This paper discusses how customer demands have prompted recent changes in the data warehouse market, and how those changes are opening the door for a new breed of vendors beyond those who previously dominated the industry with stack offerings. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Storage Virtualization by Hitachi Data Systems

April 16, 2013 - (Free Research)
Watch this video to learn how one vendor's storage virtualization solution gives you access to all of your resources from a single interface, significantly simplifies management and reduces the overall costs of your IT environment. 
(VIDEO) READ ABSTRACT |

DevOps for a New Millennium: A Lifecycle Perspective Supporting Business Growth in an Altered Economy by OpTier (E-mail this company)

April 22, 2013 - (Free Research)
This comprehensive research report examines the current state of DevOps and Agile methods in today's IT environment. Explore the modern, collaborative role of DevOps, compare technologies from top DevOps vendors, and check out real-world case studies of DevOps implementations. 
(WHITE PAPER) READ ABSTRACT |

Environmentally-friendly mobile handsets and applications by ComputerWeekly.com

November 15, 2010 - (Free Research)
The pressure on businesses to develop strategies which embrace environmental sustainability has increased dramatically in recent years, driven both by concerns about the long-term availability of fossil fuels and the impact of  corporate activities upon the environment. 
(WHITE PAPER) READ ABSTRACT |

Mobile phone app opportunities for business by ComputerWeekly.com

December 01, 2010 - (Free Research)
Over the past 12 months, the global market for applications – fuelled by the astonishing and unprecedented activity experienced on Apple’s App Store and iPhone – has continued its stellar levels of growth. 
(WHITE PAPER) READ ABSTRACT |

Empower IT to prioritize tasks with automation by VMware, Inc.

April 10, 2013 - (Free Research)
This whitepaper shares the value of automation in virtualized data centers and how it can free up IT to improve your organization. 
(WHITE PAPER) READ ABSTRACT |

M3O® OPERATIONS BOOK D A T A S H E E T by Vitria Technology, Inc.

August 23, 2011 - (Free Research)
Read this data sheet to learn more about Vitria M3O Operations Book. 
(DATA SHEET) READ ABSTRACT |

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test by National Instruments

January 2006 - (Free Research)
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts