Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 421Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Feb 26, 2015

Hospitals and healthcare providers are united under one central mission: to provide exceptional care to patients while keeping costs down. Increasingly, that’s being accomplished through technology, and healthcare providers are becoming incredibly dependent on IT for their day-to-day operations.

Tags : healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
By: IBM     Published Date: Feb 18, 2015

TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.

Tags : ibm, release cycles, mobile testing, it management, business activity monitoring, business intelligence
    
By: CA Technologies     Published Date: Feb 09, 2015

This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.

Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring, business activity monitoring
    
By: BitSight Technologies     Published Date: Feb 03, 2015

Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.

Tags : risk management, security ratings, compliance mandates, executive reporting, security risk assessments, security, it management, knowledge management
    
By: BitSight Technologies     Published Date: Feb 03, 2015

In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.

Tags : security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management
    
By: BitSight Technologies     Published Date: Feb 03, 2015

Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).

Tags : cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security, security, it management, knowledge management
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Tags : cyber insurance, cybercrime, business risk, cyber insurance, security, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.

Tags : ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
By: IBM     Published Date: Feb 11, 2015

Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

Tags : ibm, ibm x-force, ip reputation tracking, iot, security landscape, security, knowledge management, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring
    
By: CA Technologies     Published Date: Jan 09, 2015

This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.

Tags : api management, business security, components of api management, api solutions, enterprise level api management, access control, application security, application performance management
    
By: Dell Cloud Marketplace     Published Date: Jan 07, 2015

In this report, we look at the different approaches of these two groups based on a Gigaom Research survey of 500 IT decision makers at large U.S. organizations.

Tags : dell, it survey, cloud, cloud services, cloud computing, it experts, it survey, free research
    
By: DataSift     Published Date: Dec 04, 2014

How is working with social media data relevant and accessible in the context of application development? How can working with social media data be made valuable as well as both economically and technically feasible?

Tags : datasift, social media data, social media, social media analytics, application development, big data, business activity monitoring, business analytics
    
By: CA Technologies     Published Date: Nov 12, 2014

This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.

Tags : optimizing it capacity, the demands on the it department, performance optimization, it management, application integration, application performance management, business activity monitoring, business management
    
By: CA Technologies     Published Date: Nov 12, 2014

A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.

Tags : application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization, it management, data management, application integration
    
By: McAfee     Published Date: Nov 12, 2014

This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.

Tags : data loss prevention, dlp, healthcare, dlp best practices, data management, best practices, business activity monitoring
    
By: SAS     Published Date: Nov 10, 2014

Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: Teradata     Published Date: Nov 06, 2014

As today’s marketing analytics requirements become increasingly cross-channel and real-time, your organization can’t risk crude integration between marketing and analytics assets. Together, these assets must work like a well-oiled machine. So what can you do? Should you integrate standalone marketing and analytics systems? Watch this to discover answers from industry experts.

Tags : teradata, business intelligence, marketing intelligence, marketing analytics, marketing automation, business activity monitoring, business analytics, analytical applications
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: Bazaarvoice     Published Date: Nov 05, 2014

How do shopping holidays like Cyber Monday and Boxing Day affect review usage? What does review traffic reveal about back-to-school shopping? Download The Conversation Index to see how customer conversations impact the global shopping seasons.

Tags : bazaarvoice, shopper conversations, social data, research peaks, holiday shoppers, customer feedback, cyber monday, black friday
    
By: IBM     Published Date: Nov 03, 2014

Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.

Tags : infrastructure visibility, it complexity, search analytics, problem identification, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Oct 14, 2014

Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

Tags : ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.

Tags : it security breach, csirp, cyber threats, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.

Tags : security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

Tags : disaster recovery, dr in-house, outsourcing, knowledge management, business activity monitoring, business analytics, business intelligence
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.