Graphs Access Monitoring WebcastWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Graphs Access Monitoring Webcast returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Business Intelligence Solutions
 •   Access Control
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Enterprise Resource Planning (ERP)
 •   Operational BI

Related Searches
 •   Benefits Graphs Access
 •   Compare Graphs Access Monitoring
 •   Example Graphs Access
 •   Graphs Access Methodology
 •   Graphs Access Monitoring Procedures
 •   Graphs Access Processing
 •   Graphs Electronic
 •   Graphs Flow
 •   Graphs Regional
 •   Timeline Graphs
Advertisement

ALL RESULTS
1 - 25 of 433 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

University of the Sunshine Coast Improves Security with Sentinel by NetIQ

May 17, 2012 - (Free Research)
Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security. 
(CASE STUDY) READ ABSTRACT |

User Access Controls: Authorizations Insight for PeopleSoft by Approva Corporation

January 2007 - (Free Research)
Approva's Authorizations Insight for PeopleSoft monitors user authorizations across all your PeopleSoft ERP environments to detect, remediate and prevent segregation of duties (SoD) conflicts and inappropriate access to sensitive pages. 
(DATA SHEET) READ ABSTRACT |

Architecting a vCloud by VMware, Inc.

May 2011 - (Free Research)
If your organization has decided to take advantage of cloud computing benefits such as increased agility and flexibility, you may be wondering: Where is the best place to start? Read on for a guide to taking the first steps toward leveraging cloud computing across your organization. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Intuit QuickBase: Increase Visibility with Web-based Project Management by Intuit QuickBase

Web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes. With QuickBase, you can get and keep everyone -- team members, clients, vendors, freelancers -- on the same page with better visibility and accountability for everyone. 
(ASP)

SolarWinds Engineer's Toolset by SolarWinds, Inc.

May 2008 - (Free Research)
Packed with 49 powerful desktop tools, SolarWinds Engineer's Toolset delivers everything you need to diagnose, troubleshoot, and manage your network - all in one easy-to-use package. 
(TRIAL SOFTWARE) READ ABSTRACT |

Learning How To Learn Hadoop by Global Knowledge

February 2013 - (Free Research)
Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Social Graphing Analysis on the Bottom Line: How Zynga Performs Graph Analysis with the Vertica Analytics Platform by Vertica Systems

August 2011 - (Free Research)
It may be surprising to find that Zynga is performing some of the most advanced analytics anywhere. With a user base of over 250 million monthly active users, this white paper describes why Zynga uses the Vertica Analytics Platform to improve its business and game features. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Your Cisco Network Monitoring Strategy by Ixia

February 2014 - (Free Research)
Network monitoring is an increasingly important component for your overall Cisco architecture. Access this webcast to learn how to gain visibility and control of network traffic. 
(WEBCAST) READ ABSTRACT |

Xangati VDI Dashboard Overview by Xangati

December 2013 - (Free Research)
This webcast explores a VDI “dashboard” system that can allow you to monitor and actively maintain clients, desktops, hosts, application servers and more. 
(WHITE PAPER) READ ABSTRACT |

Delivering Next Generation User Interfaces for Business Intelligence Using AJAX by Information Builders

November 2006 - (Free Research)
This paper explains why Information Builders chose to use a component-based AJAX architecture for its new report and graph authoring solution - WebFOCUS Power Painter. 
(WHITE PAPER) READ ABSTRACT |

Objects, Databases and the Myth of Serialization by Versant Corp.

August 2010 - (Free Research)
Authors quite commonly, and incorrectly, refer to the process of serialization as part of what is happening when an object database stores an object or object graph. This white paper debunks that misperception, and sets the record straight about the efficiency of object databases as brought about by the avoidance of serialization. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Analytic Mobile Application by Workday

August 2013 - (Free Research)
Watch this concise webcast to uncover all the ins-and-outs of the real-time analytic mobile application. 
(WEBCAST) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

Secure Cloud Access Reference Architecture Model by Intel

May 2011 - (Free Research)
Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more. 
(WEBCAST) READ ABSTRACT |

Why BI Is Yesterday’s Approach by Oversight Systems

July 2012 - (Free Research)
BI tools help companies process and understand data but often require complex, time-consuming manual processes. This paper addresses how you can avoid wasting valuable time and efforts looking over reports and interpreting graphs and instead get clear real-time business insights that help you do your job and meet your goals. 
(WHITE PAPER) READ ABSTRACT |

IBM zSecure Compliance and Administration by IBM

March 2013 - (Free Research)
View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information. 
(WEBCAST) READ ABSTRACT |

Managing Access Security in a Multi-Perimeter World by IBM

December 2012 - (Free Research)
Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 433 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts