Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 400Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: IBM     Published Date: Sep 15, 2014

In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.

Tags : data center economics, application performance, critical data, big data, flash storage, storage system, data management, storage management
    
By: TeamQuest     Published Date: Sep 05, 2014

Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis

Tags : business activity monitoring, business intelligence, project management, service management
    
By: TeamQuest     Published Date: Sep 04, 2014

Enterprise Holdings (EHI) is the corporate parent of Enterprise Rent-A-Car, Alamo Rent A Car, National Car Rental and Enterprise CarShare. With annual revenues of $16.4 billion and more than 78,000 employees, EHI and its affiliates own and operate almost 1.4 million cars and trucks. This makes it the largest car rental service provider in the world measured by revenue, employees and fleet.

Tags : business metrics, automated forecasting, automated data collection, business activity monitoring, it spending, project management
    
By: IBM     Published Date: Sep 02, 2014

To get timely and trusted insights from Risk Analytics while minimizing IT risk and improving time-to-value, IBM is delivering an Application Ready Solution for Algorithmics. This integrated offering, anchored on a validated scalable high-performance clustered reference architecture, delivers the timely risk insights firms need to lower Tier 1 capital.

Tags : ibm, risk management, risk analytics, data analytics, finance reports, business analytics, business activity monitoring, business management
    
By: Esker     Published Date: Jan 06, 2014

13 Questions for Maximizing Your Order Processing Automation Investment

Tags : esker, automation, sales order processing, order-to-cash, erp systems, automated sales, automation investment, saas
    
By: Imprivata     Published Date: Dec 06, 2013

This case study focuses on the implementation of single sign-on at The John Hopkins Hospital which streamlined provider access to applications.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: IFS     Published Date: Dec 27, 2012

Realize the benefits of consolidating your ERP products down to one.

Tags : erp, enterprise resource planning, enterprise, integration, process management, project management, application integration, application performance management
    
By: IBM     Published Date: Sep 15, 2014

Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.

Tags : software delivery, idea tracking, monitoring, software development, application performance management, best practices, business activity monitoring
    
By: TIBCO     Published Date: Aug 18, 2014

Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.

Tags : tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: IBM     Published Date: May 02, 2014

Leading companies automate their record to report processes. Learn how!

Tags : ibm, aberdeen group, big roi, companies automate, business intelligence, change management, external compliance, rtp
    
By: Dyn     Published Date: Mar 27, 2014

Having trouble reaching your customers’ inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are If your reputation is lower than you’d like just follow these 4 easy steps to start hitting the inbox.

Tags : dyn, sender reputation, ip and domain, warming an ip, ip addresses, email program, maintaining lists, spam trigger words
    
By: IBM     Published Date: Mar 20, 2014

This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances. The paper was developed by Enterprise Management Associates - an IT Analyst firm.

Tags : ibm, enterprise assets, it assets, data management, it management, enterprise asset management, ema, it organization
    
By: SAS     Published Date: Mar 14, 2014

This Q&A with Tom Davenport, Director of Research for the International Institute for Analytics (IIA), will help you understand how analytics is evolving, where you need to go, and how to get there.

Tags : sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives
    
By: SAS     Published Date: Mar 14, 2014

Stop to think about how - and how often - your business interacts with customers. Most organizations believe that only a small fraction of data on interactions generated are effectively put to use. Why is that? Check out this whitepaper to see.

Tags : sas, voc, voice of customer, visual text analytics, best practices, customer voice, sound of sentiment, text data
    
By: SAS     Published Date: Mar 14, 2014

This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.

Tags : sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
    
By: NAVEX Global     Published Date: Mar 04, 2014

If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your all-inclusive resource.

Tags : navex global, ethics and compliance, code of conduct, policy management, perspectives, assessment tools, best-practice, automation
    
By: IBM     Published Date: Mar 04, 2014

Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.

Tags : business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation
    
By: IBM     Published Date: Mar 04, 2014

The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?

Tags : business operations, business process management, bpm, process automation, smarter process, age of customer, business activity monitoring, business analytics
    
By: FireEye     Published Date: Feb 28, 2014

Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.

Tags : fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
By: IBM     Published Date: Feb 27, 2014

Learn about the evolution of business resiliency management and learn the best practices that are used in today's business resiliency management programs.

Tags : business resiliency, business resiliency management, management, best practices, ibm, planning, managing, resilience
    
By: IBM     Published Date: Feb 04, 2014

Explore the top five practices in today's customer-data-driven supply chain and examine the impact of using customer data on key supply chain metrics.

Tags : ibm, aberdeen group, analytics report, customer data, data-driven, supply chain, best practices, social shopping
    
By: IBM     Published Date: Feb 04, 2014

As new technology and connected consumers redefine how business is done, IBM Smarter Commerce solutions help companies more effectively engage with customers across four critical aspects, which include the Buy, Market, Sell and Service components. This ebook outlines those areas and solutions for each.

Tags : ibm, smarter commerce, buy process, buy solutions, redefining marketing, connected consumers, market solutions, sales success
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.