Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 433Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 15, 2015

Business Process Management For Dummies, IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits from higher customer satisfaction to greater agility in adapting to changing market conditions. Chapter 1:Understanding BPM Chapter 2: Getting Started with BPM Chapter 3: Putting BPM to Work for your Organization Chapter 4: Improving BPM Automation and Decision Management Chapter 5: Checking out BPM Success Stories Chapter 6: Reasons to Choose BPM from IBM

Tags : ibm, dummies, business process management, business intelligence, best practices, automation, application integration, application performance management
    
By: Seagate Technology     Published Date: Apr 14, 2015

Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.

Tags : video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras, biometrics, best practices, business activity monitoring
    
By: Riverbed     Published Date: Apr 24, 2015

A whitepaper describing application performance management and new opportunities offered by unified communications technology.

Tags : api, unified communications, applications, monitoring, application management, communications, network performance, network performance management
    
By: Intuit QuickBase     Published Date: Apr 10, 2015

Utilizing spreadsheets to manage projects carries a variety of hidden costs and risks that collectively make it unsuitable beyond a few project team members. Download this whitepaper to learn why.

Tags : intuit, quickbase, spreadsheets, excel, project management, it costs, workflow, business activity monitoring
    
By: Dell     Published Date: Mar 30, 2015

Dell has teamed with Intel to create innovative solutions that can accelerate the research, diagnosis and treatment of diseases through personalized medicine. The combination of leading-edge Intel® processors and the systems and storage expertise from Dell create a state-of-the-art solution that is easy to install, manage and expand as required. Download to learn more.

Tags : dell, intel, genomics, research, data analysis, gdap, servers, blade servers
    
By: IBM     Published Date: Mar 10, 2015

This IBM ebook explains what systems engineering is and how it can help you simplify the development of smart, connected products.  Learn how to speed time-to-market, ensure business agility, deliver high-quality smart products, and cut costs.

Tags : ibm, systems engineering, product quality, business agility, best practices, networking, it management, business activity monitoring
    
By: Riverbed     Published Date: Feb 26, 2015

Hospitals and healthcare providers are united under one central mission: to provide exceptional care to patients while keeping costs down. Increasingly, that’s being accomplished through technology, and healthcare providers are becoming incredibly dependent on IT for their day-to-day operations.

Tags : healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
By: IBM     Published Date: Feb 18, 2015

TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.

Tags : ibm, release cycles, mobile testing, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Feb 11, 2015

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.

Tags : ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
By: IBM     Published Date: Feb 11, 2015

Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

Tags : ibm, ibm x-force, ip reputation tracking, iot, security landscape, security, knowledge management, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring
    
By: CA Technologies     Published Date: Feb 09, 2015

This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.

Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring, business activity monitoring
    
By: BitSight Technologies     Published Date: Feb 03, 2015

Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.

Tags : risk management, security ratings, compliance mandates, executive reporting, security risk assessments, security, it management, knowledge management
    
By: BitSight Technologies     Published Date: Feb 03, 2015

In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.

Tags : security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management
    
By: BitSight Technologies     Published Date: Feb 03, 2015

Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).

Tags : cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security, security, it management, knowledge management
    
By: CA Technologies     Published Date: Jan 09, 2015

This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.

Tags : api management, business security, components of api management, api solutions, enterprise level api management, access control, application security, application performance management
    
By: Dell Cloud Marketplace     Published Date: Jan 07, 2015

In this report, we look at the different approaches of these two groups based on a Gigaom Research survey of 500 IT decision makers at large U.S. organizations.

Tags : dell, it survey, cloud, cloud services, cloud computing, it experts, it survey, free research
    
By: SurfWatch Labs     Published Date: Jan 06, 2015

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Tags : cyber insurance, cybercrime, business risk, cyber insurance, security, business activity monitoring
    
By: DataSift     Published Date: Dec 04, 2014

How is working with social media data relevant and accessible in the context of application development? How can working with social media data be made valuable as well as both economically and technically feasible?

Tags : datasift, social media data, social media, social media analytics, application development, big data, business activity monitoring, business analytics
    
By: CA Technologies     Published Date: Nov 12, 2014

This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.

Tags : optimizing it capacity, the demands on the it department, performance optimization, it management, application integration, application performance management, business activity monitoring, business management
    
By: CA Technologies     Published Date: Nov 12, 2014

A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.

Tags : application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization, it management, data management, application integration
    
By: McAfee     Published Date: Nov 12, 2014

This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.

Tags : data loss prevention, dlp, healthcare, dlp best practices, data management, best practices, business activity monitoring
    
By: SAS     Published Date: Nov 10, 2014

Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: Teradata     Published Date: Nov 06, 2014

As today’s marketing analytics requirements become increasingly cross-channel and real-time, your organization can’t risk crude integration between marketing and analytics assets. Together, these assets must work like a well-oiled machine. So what can you do? Should you integrate standalone marketing and analytics systems? Watch this to discover answers from industry experts.

Tags : teradata, business intelligence, marketing intelligence, marketing analytics, marketing automation, business activity monitoring, business analytics, analytical applications
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.