Case Activity MonitoringWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Case Activity Monitoring returned the following results.
RSS What is RSS?
Related Categories

 •   Business Activity Monitoring (BAM)
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Security
 •   Business Process Automation
 •   Business Planning
 •   Security Monitoring
 •   Service Oriented Architecture (SOA)
 •   Databases
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Case Activity Infrastructure
 •   Case Activity Monitoring Orders
 •   Case Business
 •   Case Calendars
 •   Case Measures
 •   Contacts Case
 •   Implementing Case Activity Monitoring
 •   Market Case Activity
 •   Questions About Case Activity Monitoring
 •   Specialists Case Activity
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript:  Deploying Database Activity Monitoring by IBM

March 11, 2011 - (Free Research)
Database Activity Monitoring tools offer an unparalleled ability to protect sensitive assets without interfering with business processes. This presentation transcript of the video “Deploying Database Activity Monitoring,”  will teach you how to determine the best use cases for DAM, what you need to protect and how to select a deployment model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 16, 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva

June 2010 - (Free Research)
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

webMethods Optimize for Process by SoftwareAG Inc., USA

February 2009 - (Free Research)
webMethods Optimize for Process facilitates real-time insight into key business process activities, providing business managers with the actionable information they need to make informed decisions and quickly address problems. 
(DATA SHEET) READ ABSTRACT |

Business Activity Monitoring: Process Control for the Enterprise by SL Corporation

May 2008 - (Free Research)
This whitepaper discusses how lessons can be taken from traditional process monitoring applications and applied in today's more complex multi-dimensional environments. 
(WHITE PAPER) READ ABSTRACT |

Operational BI: Getting Real Time About Performance by SAP AG

December 2007 - (Free Research)
This report provides a roadmap for the strategies and capabilities that Best-in-Class companies are employing to improve operational performance. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Strategies for building the best advanced case management architecture, Part I by IBM

November 2011 - (Free Research)
Designing a case management architecture is more of an art—really, a balancing act—than a science. In this e-guide, readers will learn to address key considerations involved in designing an effective case management architecture that extends across the enterprise to enable better collaboration and decision-making. 
(EGUIDE) READ ABSTRACT |

Playtech Case Study - HP monitoring tools deliver game-changing uptime by Hewlett-Packard Company

November 2013 - (Free Research)
Monitoring tools are often used today in order to view the true impact of events. Access this case study white paper that explains how Playtech, a gaming software company, relies on monitoring tools to ensure uninterrupted, high quality service. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Content Monitoring in the Enterprise by Lumension

January 2013 - (Free Research)
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enterprise Transparency: The Process Performance Lifecycle by IDS Scheer

June 2009 - (Free Research)
This presentation makes the case for the importance of business process performance as an indicator of overall business performance and provides an in-depth look at the ARIS solution for process intelligence and performance management. 
(PRESENTATION) READ ABSTRACT |

Business Process Management Today: Putting theory into practice by ebizQ

August 2010 - (Free Research)
In this special issue, SearchSOA looks at elements that drive the fervent interest in BPM today, with a special focus on the problems teams run into when they convert theory into practice. Read about workflow do’s and don’ts, BAM strategies, and CEP implementation challenges in this first edition of SearchSOA’s BPM quarterly. 
(EZINE)

Get the Whole Picture: Why Most Organizations Miss User Response Monitoring-and What to Do about It by CA Technologies.

December 2013 - (Free Research)
This white paper underscores the importance of user response monitoring and explores three reasons why many organizations fail to capture this critical insight. Discover the capabilities and characteristics to look for as you evaluate your options and gain insight into  use cases where your monitoring solution will prove especially valuable. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a File Activity Monitoring Solution by Imperva

May 2011 - (Free Research)
Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years. 
(WHITE PAPER) READ ABSTRACT |

BPM Quarterly E-Zine: Business Process Management and Real-Time Analysis: Let the Real-Times Roll! by Metastorm

September 2010 - (Free Research)
The world must optimize its use of water to avert conflict. Hectic Heathrow airport needs to streamline processes to continue to grow. Meanwhile, software architects must effectively enable BAM systems that take newly enabled BPM feeds. Data analytics are becoming part of the mix for more BPM scenarios. Find out more in our BPM quarterly. 
(EZINE) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

How analytics can add value to case management by IBM

November 2011 - (Free Research)
This e-guide continues ebizQ.com's exploration of the role of analytics in successful dynamic case management (DCM). In this installment, find strategies and tactics for combining the two, and a Q & A with analyst insight on analytics and a bigger-picture view of case management. 
(EGUIDE) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools by IBM

August 2011 - (Free Research)
Protecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions. 
(EGUIDE) READ ABSTRACT |

Best Practices White Paper: How to Plan and Design for Case Management Projects with Documentum xCP by EMC Corporation

May 2011 - (Free Research)
This white paper outlines best practice design phases for organizations planning case-based application development. Learn about the EMC Documentum xCelerated Composition Platform and its value to organizations that want to increase process efficiency with automated solutions that employ composition rather than custom coding. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts