Company EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Company Event returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Event Automation
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Process Management (BPM)
 •   Enterprise Systems Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Company Event Database
 •   Company Event Distributions
 •   Company Event Industries
 •   Company Event Organizational
 •   Company Event Packages
 •   Company Faq
 •   Designs Company Event
 •   Internet Based Company Event
 •   Multi Company
 •   Planning Company Event
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Virtual Event: Power to Change - What's changing about ALM? by Hewlett-Packard Company

September 10, 2013 - (Free Research)
Register to attend the free Power to Change online virtual event sponsored by HP to hear industry visionaries, analysts, and practitioners discuss how change is affecting various aspects of application lifecycle management (ALM.) 
(EVENT) READ ABSTRACT |

Drive Your Enterprise with Event-Driven Scheduling by Help/Systems

September 17, 2009 - (Free Research)
Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE. 
(WHITE PAPER) READ ABSTRACT |

ESM Solution Helps City University to Safely Increase Student Numbers by a Third While Going Mobile by Hewlett-Packard Company

July 31, 2013 - (Free Research)
This guide explores one company's success in implementing effective security management while shifting to more mobile services. 
(WHITE PAPER) READ ABSTRACT |

Why Should Companies Take a Closer Look at Business Continuity Planning? by Datalink

May 26, 2010 - (Free Research)
Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 10, 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Event Data Warehousing by Hexis Cyber Solutions Inc

February 2008 - (Free Research)
This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods. 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for IT Event Correlation and Analysis by Hewlett-Packard Company

March 2011 - (Free Research)
This Magic Quadrant addresses mature and emerging products that help IT organizations consolidate, analyze and respond to component-level IT infrastructure events, improve event-to-incident/problem resolution processes, and improve alignment between events and business-oriented IT services. 
(WHITE PAPER) READ ABSTRACT |

Sybase Video: Complex Event Processing for Continuous Intelligence by Sybase, an SAP company

July 2011 - (Free Research)
Discover how Sybase uses Complex Event Processing to help financial services companies capitalize on critical opportunities as they happen. This real-time Continuous Intelligence delivers actionable insights to enable informed decisions that can increase revenue, solve customer problems and reduce risk. 
(VIDEO) READ ABSTRACT |

Complex event processing for more intelligent business operations by Sybase, an SAP company

June 2011 - (Free Research)
Read this ebizQ e-book for an introduction to complex event processing (CEP). Inside, learn about the role of CEP in intelligent operations, as well as gaining access to a special three-part report on capturing, analyzing and taking action on event data. 
(EBOOK)

Presentation Transcript: Introduction to Complex Event Processing (CEP) in Capital Markets by Sybase, an SAP company

February 2011 - (Free Research)
CEP is an emerging paradigm of computing based on an Event Driven Architecture (EDA) that offers the ability to analyze extremely large amounts of event (and other) data from disparate sources with very low latency and high throughput. There are numerous business benefits to CEP. Check out this presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Key Steps to Securing Your Organization and Evicting a Hacker by Foundstone, Inc.

May 2008 - (Free Research)
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks. 
(PODCAST) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by ArcSight, an HP Company

March 2011 - (Free Research)
This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints. 
(WEBCAST) READ ABSTRACT |

Beyond Job Scheduling by UC4 Software, Inc

October 2011 - (Free Research)
Organizations need a highly scalable and reliable automation platform to provide the end-to-end monitoring, orchestration, and execution to connect back and front office processes. Read this white paper to learn about an automation platform that provides these services in on-premise as well as virtual and cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Security Information and Event Management: Unique McAfee data management technology by McAfee, Inc.

March 2012 - (Free Research)
This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on SIM by SearchSecurity.com

August 2011 - (Free Research)
Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance. 
(EGUIDE) READ ABSTRACT |

The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management by Q1 Labs, an IBM Company

October 2010 - (Free Research)
The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

Six Secrets to 24x7 Exchange Availability by Marathon Technologies

September 2009 - (Free Research)
The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts