Study MonitoringWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Study Monitoring returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Managed Security Services
 •   Application Management and Maintenance
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   System Monitors
 •   Network Security
 •   Virtualization

Related Searches
 •   File Study Monitoring
 •   Finding Study
 •   Implement Study Monitoring
 •   Import Study
 •   India Study Monitoring
 •   Study Manager
 •   Study Monitoring Kansas
 •   Study Monitoring White Paper
 •   Study Monitoring White Papers
 •   Time Study Monitoring
Advertisement

ALL RESULTS
1 - 25 of 428 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Playtech Case Study - HP monitoring tools deliver game-changing uptime by Hewlett-Packard Company

November 25, 2013 - (Free Research)
Monitoring tools are often used today in order to view the true impact of events. Access this case study white paper that explains how Playtech, a gaming software company, relies on monitoring tools to ensure uninterrupted, high quality service. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 11, 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Panda Security and Delta Wines - Case Study by Panda Security

July 2013 - (Free Research)
Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up. 
(CASE STUDY) READ ABSTRACT |

Atrion Enhances Managed Services and Boosts Profit Margins with Nimsoft by Nimsoft, Inc.

November 2009 - (Free Research)
Atrium needed help gaining end-to-end service level monitoring insights and finding a monitoring platform with a strategic vendor partnership that could help support business growth objectives. Read this case study to learn about the problems Atrion faced and how Nimsoft products helped them overcome those challenges. 
(CASE STUDY) READ ABSTRACT |

Baylor College of Medicine Ensures Integrity of Groundbreaking Scientific Research with VMware vFabric Hyperic by VMware, Inc.

December 2010 - (Free Research)
How did Baylor College of Medicine achieve comprehensive application monitoring, as well as reduce response time, increase speed of resolution, and improve virtualization performance? Read this case study to find out! 
(WHITE PAPER) READ ABSTRACT |

Optimizing Application Monitoring by GroundWork, Inc.

March 2008 - (Free Research)
After studying dozens of designs for application monitoring, it has been found that the optimal solution is often achieved through simple synthetic transaction monitors. 
(WHITE PAPER) READ ABSTRACT |

Amplifying the Signal in the Noise of IT Monitoring by Zenoss, Inc.

October 2013 - (Free Research)
This case study details the value of moving past the traditional, fragmented approach to IT monitoring. 
(WHITE PAPER) READ ABSTRACT |

VKernel Case Study: ScripNet by VKernel

July 2010 - (Free Research)
Discover how utilizing the VKernel Capacity Bottleneck Analyzer allows you to continuously monitor shared CPU, memory, and storage usage for proper allocation of resources among all of your vm's. Find out how to use the VKernel Capacity Analyzer and Chargeback virtual appliances to learn who is using what resources and how much it costs. 
(CASE STUDY) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by Dell SecureWorks UK

March 2012 - (Free Research)
In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis. 
(CASE STUDY) READ ABSTRACT |

University of the Sunshine Coast Improves Security with Sentinel by NetIQ

May 2012 - (Free Research)
Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security. 
(CASE STUDY) READ ABSTRACT |

Maximize Efficiency on IBM Power 6 Systems by CCSS

March 2012 - (Free Research)
Access this essential case study to learn how one company used a set of performance monitoring and reporting systems to help them increase the efficiency of their IBM machines. 
(WHITE PAPER) READ ABSTRACT |

Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities by HyTrust

July 2011 - (Free Research)
With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Case Study: Fortune 100 Insurance Company and Security Weaver by Security Weaver

November 2010 - (Free Research)
For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company. 
(CASE STUDY) READ ABSTRACT |

Shanghai Jaio Tong University case study: University leads field in academic excellence by Dell, Inc.

July 2013 - (Free Research)
Read this case study on an educational institution looking to deliver high-speed networks for their new standardized multimedia examination classrooms, and learn how deploying simplified network switches with configuration abilities allowed them to successfully upgrade their facilities. 
(WHITE PAPER) READ ABSTRACT |

VMware vFabric™ Hyperic® Flexible Monitoring Helps High-Growth Managed Hosting Provider Meet Tough Service Level Agreements (SLAs) by VMware, Inc.

April 2011 - (Free Research)
Read this case study to learn how VMware vFabric Hyperic helped managed hosting provider Contegix, manage infrastructure from an application point of view, improve the service level of its infrastructure, exceed customer expectations, and more. 
(CASE STUDY)

Case Study: Deploying the Best SIEM System Available by Hewlett-Packard Limited

April 2013 - (Free Research)
Uncover the SIEM a security service provider uses to help them achieve real-time visibility and control over their systems and services to increase intelligence, protection, and safety. 
(CASE STUDY) READ ABSTRACT |

Heartland Payment Systems: Neustar UltraDNS Case Study by Neustar®

March 2014 - (Free Research)
This informative case study discusses how a financial transaction service organization was able to utilize a security tool to virtually eliminate downtime through 24/7 monitoring and DDoS protection. 
(CASE STUDY) READ ABSTRACT |

Ponemon Study: 2011 Cost of a Data Breach by Symantec Corporation

March 2012 - (Free Research)
This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response. 
(WHITE PAPER) READ ABSTRACT |

BRIO Restaurant Group, Inc. Case Study by SonicWALL

February 2011 - (Free Research)
Previously, some of BBRG's restaurant banquet rooms were wired for Internet connectivity, but management wanted to provide wireless so that more guests could get online. BBRG would be one of the first in their industry tier to offer wireless services. To assist with the solution, BBRG turned to their experienced service provider, Cerdant. 
(CASE STUDY) READ ABSTRACT |

The Total Economic Impact of CA Technologies’ Business Service Insight Solution by CA Technologies.

December 2011 - (Free Research)
Read this study conducted by Forrester Consulting on behalf of CA Technologies, you learn about the ROI impact of a SLA management platform that offers features for data metrics, automation, performance monitoring, and more. 
(WHITE PAPER) READ ABSTRACT |

ROI Case Study: Quest Foglight at Imperial College London by ComputerWeekly.com

June 2012 - (Free Research)
Imperial College London deployed Quest Foglight to manage the performance of its applications, databases, and services and reduce system downtime. Nucleus Reseach evaluates the ROI of the project. 
(ANALYST REPORT) READ ABSTRACT |

Review of Four Studies Comparing Efficiency of AC and DC Distribution for Data Centers by Schneider Electric

July 2012 - (Free Research)
In this quantitative research paper, examine data from four different studies and real-world data to determine whether AC or DC power distribution can best maximize energy savings. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 428 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts