activity monitoring

Results 26 - 50 of 55Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security
    
Oracle Corp.
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening, consolidation, lifecycle, business activity monitoring, bam, business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense"
    
McAfee
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: SAS     Published Date: Sep 08, 2010
This paper describes five business analytics styles used today and the building blocks required in implementing these styles. It is important to consider which of these styles is valid for your organization now and into the future.
Tags : 
sas, reporting, data warehouses, business activity monitoring, data integration
    
SAS
Published By: SpectorSoft     Published Date: Aug 28, 2012
This whitepaper will describe the best methodologies used to perform investigations, and why investigating proactively can help.
Tags : 
human resources, spectorsoft, employee investigations, file auditing, user activity monitoring
    
SpectorSoft
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : 
tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert, integrated configuration control
    
Tripwire
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics, activity monitoring, corporate performance management, outlooksoft, outlook soft
    
OutlookSoft
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring, access control, regulatory compliance, hipaa, fisma, audit, auditing, windows
    
NetIQ Corporation
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, webcast, retirement, mutual funds, college planning, insurance, credit, taxes, mortgage/real estate, savings, financial advisors, technology
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa, retirement, mutual funds, college planning, insurance, credit, taxes, mortgage/real estate, savings, financial advisors, technology
    
IBM Corporation
Start   Previous    1 2 3    Next    End
Search Resource Library