Events DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Events Data returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Statistical Data Analysis
 •   Managed Security Services
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   Business Process Management (BPM)

Related Searches
 •   Events Data Batch
 •   Events Data Decision
 •   Events Data Export
 •   Events Manufacturers
 •   Events Roi
 •   Import Events
 •   Manuals Events Data
 •   Networks Events Data
 •   Practice Events Data
 •   Printable Events
Advertisement

ALL RESULTS
1 - 25 of 424 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 18, 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

Event Data Warehousing by Hexis Cyber Solutions Inc

February 2008 - (Free Research)
This white paper describes that data warehousing should not necessarily be the basis upon which companies retain and query historic data for prolonged periods. 
(WHITE PAPER) READ ABSTRACT |

SenSage Event Data Warehouse by Hexis Cyber Solutions Inc

July 1967 - (Free Research)
This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Complex event processing for more intelligent business operations by Sybase, an SAP company

June 2011 - (Free Research)
Read this ebizQ e-book for an introduction to complex event processing (CEP). Inside, learn about the role of CEP in intelligent operations, as well as gaining access to a special three-part report on capturing, analyzing and taking action on event data. 
(EBOOK)

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Event Stream Processing and Event Driven Architectures by Progress

October 2006 - (Free Research)
This white paper describes the motivation for EDA, introduces ESP, and describes how ESP technology fits within the ESB/SOA model. 
(WHITE PAPER)

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by ArcSight, an HP Company

March 2011 - (Free Research)
This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints. 
(WEBCAST) READ ABSTRACT |

Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform by LogRhythm, Inc.

December 2012 - (Free Research)
This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security by Tripwire, Inc.

February 2011 - (Free Research)
Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security. 
(DATA SHEET) READ ABSTRACT |

M3O® OPERATIONS BOOK D A T A S H E E T by Vitria Technology, Inc.

August 2011 - (Free Research)
Read this data sheet to learn more about Vitria M3O Operations Book. 
(DATA SHEET) READ ABSTRACT |

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by FalconStor Software

October 2009 - (Free Research)
This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time. 
(WHITE PAPER) READ ABSTRACT |

Defending Against APTs: Do You Have the Complete Picture? by Hexis Cyber Solutions Inc

July 2013 - (Free Research)
Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

Cloud Computing for Developers by IBM

September 2010 - (Free Research)
Join us for the Cloud computing for developers virtual events in October and learn how to solve business and technical challenges in the cloud. Through real-world examples of specific challenges and solutions, as well as live demos of techniques and products, you can learn more about leveraging the cloud. Read on for details. 
(EVENT)

A Guide to Modern IT Disaster Recovery by VMware, Inc.

June 2013 - (Free Research)
This resource presents the theory of Black Swam Events, and shows you how to prepare and mitigate the consequences on your data center. 
(WHITE PAPER) READ ABSTRACT |

Empowering the Business to Sense and Respond: Delivering Business Event Processing with IBM WebSphere Business Events by IBM

July 2008 - (Free Research)
This paper addresses one of the critical IBM technologies for supporting agility and alignment, Business Event Processing (BEP). 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for IT Event Correlation and Analysis by Hewlett-Packard Company

March 2011 - (Free Research)
This Magic Quadrant addresses mature and emerging products that help IT organizations consolidate, analyze and respond to component-level IT infrastructure events, improve event-to-incident/problem resolution processes, and improve alignment between events and business-oriented IT services. 
(WHITE PAPER) READ ABSTRACT |

GFI LANguard Security Event Log Monitor - Downloads by GFI Software

May 2006 - (Free Research)
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system. 
(TRIAL SOFTWARE) READ ABSTRACT |

Virtual + Physical = Hybrid Events:  Best Practices for Creating Compelling, Innovative Hybrid Events by INXPO

November 2010 - (Free Research)
This whitepaper explores the growing role of virtual technologies in physical events (hybrid events) in marketing and communication, as well as identifies five best practices for maximizing their success in achieving organizational goals. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Drive Your Enterprise with Event-Driven Scheduling by Help/Systems

September 2009 - (Free Research)
Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE. 
(WHITE PAPER) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Expert tips for BPM and event-driven processing by IBM

November 2011 - (Free Research)
In this e-guide, readers interested in implementing event-driven processing and business process management (BPM) will learn tips for proving ROI with BPM, best practices for implementing event processing, and  process-oriented strategies to gain greater value from a BPM suite. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 424 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts