HIT Consultant Insightful coverage of healthcare innovation
 

infrastructure monitoring

Results 1 - 25 of 95Sort Results By: Published Date | Title | Company Name
Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
    
AirDefense
Published By: Aternity     Published Date: May 18, 2015
Seven capabilities are required to address the complexity of delivering excellent enterprise mobile experience. Download this whitepaper to learn how.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aternity     Published Date: May 18, 2015
Download this whitepaper to learn the five reasons why End User Experience Management is much more than a dimension of APM.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aternity     Published Date: May 19, 2015
Read this whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their workforce users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aternity     Published Date: May 22, 2015
Learn how Aternity redefines end user experience management in this series of brief videos.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall
    
Athena Security
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure
    
Avocent
Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
Published By: AWS     Published Date: Nov 15, 2018
Today’s IT teams spend far too much time struggling against increasing system complexity and tools failing to make monitoring easier and more reliable. To combat these challenges, both admins and site reliability engineers need a clear view of infrastructure performance and availability. Splunk® Insights for Infrastructure (SII) is an analytics-driven monitoring solution that provides the seamless experience organizations need for infrastructure monitoring on the AWS cloud. Download this product brief and discover how SII offers: • An easy install within minutes—available as a free download • Detailed investigations through granular metrics • Seamless monitoring and troubleshooting
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
Today’s IT teams spend far too much time struggling against increasing system complexity and tools failing to make monitoring easier and more reliable. To combat these challenges, both admins and site reliability engineers need a clear view of infrastructure performance and availability. Splunk® Insights for Infrastructure (SII) is an analytics-driven monitoring solution that provides the seamless experience organizations need for infrastructure monitoring on the AWS cloud. Download this product brief and discover how SII offers: • An easy install within minutes—available as a free download • Detailed investigations through granular metrics • Seamless monitoring and troubleshooting
Tags : 
    
AWS - ROI DNA
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.
Tags : 
ca technologies, dcim, data center, data center operations, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
If you’ve seen recent car ads, you know they’re as likely to promote applications and connections as they are styling and horsepower. But manufacturers aren’t the only ones pushing apps these days. Banks, airlines, restaurants—you name it—all are using them to attract and engage customers. This is the application economy; where every company is in the software business and user experience is the new survival of the fittest.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The APM market is one of the largest subsegments of the IT operations management market, with 2016 revenue of approximately $3.7 billion and a growth rate exceeding 18% over the prior year. Given these statistics, it is no surprise that Gartner observes continuing investment. Interestingly, while Gartner has observed many new startups appearing on the radar screen, we've also seen large software organizations such as CA Technologies, IBM, Oracle and Microsoft (re)investing at the same time. Other non-APM companies are also expressing potential interest in the market — almost all of the current APM suite providers expect to see companies like Google and Amazon boost their primarily infrastructure monitoring capabilities with increased support for application visibility. Yet these (and other large) cloud companies will pose another challenge for the traditional APM players — the battle for talent acquisition. There is some concern within the APM market that highly skilled individuals may
Tags : 
ca technologies, monitoring, programs, applications
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: Cisco     Published Date: Sep 07, 2016
This white paper discusses how the data broker along with Cisco Nexus 9000 Series Switches integrates with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.