Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 416Sort Results By: Published Date | Title | Company Name
By: DataSift     Published Date: Dec 04, 2014

How is working with social media data relevant and accessible in the context of application development? How can working with social media data be made valuable as well as both economically and technically feasible?

Tags : datasift, social media data, social media, social media analytics, application development, big data, business activity monitoring, business analytics
    
By: SAS     Published Date: Nov 10, 2014

Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: Teradata     Published Date: Nov 06, 2014

As today’s marketing analytics requirements become increasingly cross-channel and real-time, your organization can’t risk crude integration between marketing and analytics assets. Together, these assets must work like a well-oiled machine. So what can you do? Should you integrate standalone marketing and analytics systems? Watch this to discover answers from industry experts.

Tags : teradata, business intelligence, marketing intelligence, marketing analytics, marketing automation, business activity monitoring, business analytics, analytical applications
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 03, 2014

Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.

Tags : infrastructure visibility, it complexity, search analytics, problem identification, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Nov 14, 2014

Join Gartner and IBM for an informative webinar where you will learn how to combine best of breed analytic solutions to provide a low latency, shared big data infrastructure. This helps government IT departments make faster decisions by analyzing massive amounts of data, improving security, detecting fraud, enabling faster decisions and saving cost by optimizing and sharing your existing infrastructure.

Tags : ibm, hadoop, data, business analytics, data analytics, business intelligence, security management, business activity monitoring
    
By: CA Technologies     Published Date: Nov 12, 2014

This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.

Tags : optimizing it capacity, the demands on the it department, performance optimization, it management, application integration, application performance management, business activity monitoring, business management
    
By: CA Technologies     Published Date: Nov 12, 2014

A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.

Tags : application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization, it management, data management, application integration
    
By: McAfee     Published Date: Nov 12, 2014

This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.

Tags : data loss prevention, dlp, healthcare, dlp best practices, data management, best practices, business activity monitoring
    
By: Bazaarvoice     Published Date: Nov 05, 2014

How do shopping holidays like Cyber Monday and Boxing Day affect review usage? What does review traffic reveal about back-to-school shopping? Download The Conversation Index to see how customer conversations impact the global shopping seasons.

Tags : bazaarvoice, shopper conversations, social data, research peaks, holiday shoppers, customer feedback, cyber monday, black friday
    
By: IBM     Published Date: Oct 14, 2014

Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

Tags : ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.

Tags : it security breach, csirp, cyber threats, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.

Tags : security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

Tags : disaster recovery, dr in-house, outsourcing, knowledge management, business activity monitoring, business analytics, business intelligence
    
By: IBM     Published Date: Oct 10, 2014

Forrester Research has just completed a Total Economic Impact study for a large financial services institution to quantify the actual return on investment for service virtualization. Read Forrester’s analysis to learn how service virtualization is eliminating testing bottlenecks and significantly reducing the cost of testing.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 06, 2014

IBM’s Social Media Analytics solution helps your company take advantage of everything social media has to offer in terms of getting closer to your customers, combining social media analysis and reporting with IBM SPSS predictive analytics technology.

Tags : social media, advanced analytics, customer insight, social media analytics, knowledge management, business activity monitoring, business analytics, business integration
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: IBM     Published Date: Oct 01, 2014

This white paper discusses how IBM InfoSphere can support the integration and governance of Big Data in healthcare. The white paper reviews three case studies including predictive analytics with Electronic Medical Records, time series data in a neonatal intensive care unit and predictive pathways for disease.

Tags : big data, data integration, healthcare, data management, business activity monitoring, business analytics
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Sep 15, 2014

Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.

Tags : software delivery, idea tracking, monitoring, software development, application performance management, best practices, business activity monitoring
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: IBM     Published Date: Sep 15, 2014

In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.

Tags : data center economics, application performance, critical data, big data, flash storage, storage system, data management, storage management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.