Tool EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Tool Event returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Business Intelligence Solutions
 •   Event Automation
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Business Process Management (BPM)
 •   Security Policies
 •   Business Activity Monitoring (BAM)
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Migration Tool Event
 •   Terminal Tool Event
 •   Tool Event Conversions
 •   Tool Event Designers
 •   Tool Event Flowchart
 •   Tool Event It
 •   Tool Event Simple
 •   Tool Event Techniques
 •   Tool Event Technology
 •   Tool Needs
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Keep Your BI Tools Running Smoothly with Intelligent Automation by Cisco Systems, Inc.

February 23, 2012 - (Free Research)
Read this white paper to discover intelligent automation tools that free your IT team from the labor-intensive and time-consuming tasks that are associated with the administration of the SAP NetWeaver BW Accelerator appliance while accelerating time-to-insight with easily-accessible, timely, accurate business intelligence (BI) data. 
(WHITE PAPER) READ ABSTRACT |

Server Monitoring: Centralize and Win by TNT Software, Inc.

August 12, 2009 - (Free Research)
One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions. 
(WHITE PAPER) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 01, 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Complex event processing for more intelligent business operations by Sybase, an SAP company

June 10, 2011 - (Free Research)
Read this ebizQ e-book for an introduction to complex event processing (CEP). Inside, learn about the role of CEP in intelligent operations, as well as gaining access to a special three-part report on capturing, analyzing and taking action on event data. 
(EBOOK)

Cloud Computing for Developers by IBM

September 13, 2010 - (Free Research)
Join us for the Cloud computing for developers virtual events in October and learn how to solve business and technical challenges in the cloud. Through real-world examples of specific challenges and solutions, as well as live demos of techniques and products, you can learn more about leveraging the cloud. Read on for details. 
(EVENT)

SANS Security Analytics Survey by Hewlett-Packard Company

September 30, 2013 - (Free Research)
In this analyst report by SANS, survey results indicate the need for security teams to detect and react more quickly to today's advanced threats. Learn why it's essential to invest in better security information and event management tools that offer advanced analytics and big data processing to accommodate data growth. 
(ANALYST REPORT) READ ABSTRACT |

ESM Solution Helps City University to Safely Increase Student Numbers by a Third While Going Mobile by Hewlett-Packard Company

July 31, 2013 - (Free Research)
This guide explores one company's success in implementing effective security management while shifting to more mobile services. 
(WHITE PAPER) READ ABSTRACT |

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events by Red Hat and JBoss

July 05, 2012 - (Free Research)
This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools. 
(WHITE PAPER) READ ABSTRACT |

A Pragmatic Approach to SIEM by Tripwire, Inc.

February 08, 2011 - (Free Research)
In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 01, 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 18, 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 15, 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Introduction to Complex Event Processing (CEP) in Capital Markets by Sybase, an SAP company

February 18, 2011 - (Free Research)
CEP is an emerging paradigm of computing based on an Event Driven Architecture (EDA) that offers the ability to analyze extremely large amounts of event (and other) data from disparate sources with very low latency and high throughput. There are numerous business benefits to CEP. Check out this presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

Advanced cyber-security intelligence by ComputerWeekly.com

July 2012 - (Free Research)
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. 
(ANALYST REPORT) READ ABSTRACT |

Podcast: Automating Resource Monitoring with Robot/CONSOLE by Help/Systems

April 2010 - (Free Research)
Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes. 
(PODCAST) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

September 2013 - (Free Research)
This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business. 
(ANALYST REPORT) READ ABSTRACT |

Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform by LogRhythm, Inc.

December 2012 - (Free Research)
This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by Novell, Inc.

December 2009 - (Free Research)
Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Information Security IT Decision Checklist: Security Information and Event Management by ArcSight, an HP Company

July 2011 - (Free Research)
This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process. 
(EGUIDE) READ ABSTRACT |

SecurStor 2500 RAID by Excel Meridian Data, Inc.

SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage. 
(HARDWARE PRODUCT)

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Log Management and SIEM: Build a Solid Foundation for Compliance by McAfee, Inc.

November 2012 - (Free Research)
This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts