How ActivitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: How Activities returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Business Activity Monitoring (BAM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Intelligence Solutions
 •   Databases
 •   Business Planning
 •   Network Security

Related Searches
 •   Backup How
 •   Expense How Activities
 •   History How
 •   How Activities Distribution
 •   How Activities Faqs
 •   How Activities Portal
 •   How Activities Uk
 •   How Advantages
 •   Lists How Activities
 •   Testing How
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 01, 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 01, 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 10, 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript:  Deploying Database Activity Monitoring by IBM

March 11, 2011 - (Free Research)
Database Activity Monitoring tools offer an unparalleled ability to protect sensitive assets without interfering with business processes. This presentation transcript of the video “Deploying Database Activity Monitoring,”  will teach you how to determine the best use cases for DAM, what you need to protect and how to select a deployment model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Delivering Value through Best Practice for Systems Engineering by IBM

February 25, 2010 - (Free Research)
View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more. 
(WEBCAST)

Business Activity Monitoring: Process Control for the Enterprise by SL Corporation

May 2008 - (Free Research)
This whitepaper discusses how lessons can be taken from traditional process monitoring applications and applied in today's more complex multi-dimensional environments. 
(WHITE PAPER) READ ABSTRACT |

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Operational BI: Getting Real Time About Performance by SAP AG

December 2007 - (Free Research)
This report provides a roadmap for the strategies and capabilities that Best-in-Class companies are employing to improve operational performance. 
(WHITE PAPER) READ ABSTRACT |

Ovum: Corporate eGRC update by RSA, The Security Division of EMC

December 2010 - (Free Research)
This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command by PowerTech

October 2009 - (Free Research)
When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Maximizing ROI with the Microsoft-Polycom Unified Communications Solution by Polycom, Inc.

August 2010 - (Free Research)
This whitepaper, aimed strategic decision makers, will discuss how you can reduce telephony costs, maximize your ROI and improve your business collaboration and communication activities. 
(WHITE PAPER) READ ABSTRACT |

Sales: Maximize Profitability, Improve Performance, and Deliver Customer Value by SAP America, Inc.

September 2010 - (Free Research)
This paper explains how the SAP CRM application equips your sales professionals with the tools and information they need to plan, execute, and analyze sales operations throughout the sales cycle. Continue reading to learn how to maximize profitability, improve performance, and deliver customer value with SAP CRM. 
(WHITE PAPER) READ ABSTRACT |

SAP System Build and Landscape Management Activities by Cisco Systems, Inc.

June 2010 - (Free Research)
Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components. 
(WHITE PAPER) READ ABSTRACT |

CA Compliance Manager for z/OS by CA Technologies.

May 2009 - (Free Research)
Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk. 
(WEBCAST) READ ABSTRACT |

Smart Process Applications Evaluation, Q2 2013 by OpenText

April 2013 - (Free Research)
This Forrester Wave report aims to help CIOs find the right smart process app vendor partners for improving this full spectrum of human-based processes. Read today to explore Forrester's key takeaways after conducting a 15-criteria evaluation of twelve software vendors. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

webMethods Optimize for Process by SoftwareAG Inc., USA

February 2009 - (Free Research)
webMethods Optimize for Process facilitates real-time insight into key business process activities, providing business managers with the actionable information they need to make informed decisions and quickly address problems. 
(DATA SHEET) READ ABSTRACT |

Addressing Data Security In The Cloud And Low Cost Large File Transfer by SearchSecurity.com

October 2013 - (Free Research)
The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not. 
(EGUIDE) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Powering the data centre by ComputerWeekly.com

January 2012 - (Free Research)
A look at alternative approaches to managing energy for cost and/or sustainability reasons in data centres. 
(ANALYST BRIEF) READ ABSTRACT |

Activity based working: The Hybrid Organisation: Buildings by ComputerWeekly.com

June 2010 - (Free Research)
The way we work is now open to wide-ranging review. The concept of the office as the ‘dumb’ container for work, housing the corporation and its infrastructure assets, will be challenged by a number of factors explored in this paper. Work, in the future, will only be a verb. It is becoming a process, not a place. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts