Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 400Sort Results By: Published Date | Title | Company Name
By: Esker     Published Date: Jan 06, 2014

13 Questions for Maximizing Your Order Processing Automation Investment

Tags : esker, automation, sales order processing, order-to-cash, erp systems, automated sales, automation investment, saas
    
By: Imprivata     Published Date: Dec 06, 2013

This case study focuses on the implementation of single sign-on at The John Hopkins Hospital which streamlined provider access to applications.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Marketo     Published Date: Jul 31, 2012

The Definitive Guide to Marketing Metrics and Marketing Analytics shows marketing professionals how to talk the talk of C-level executives in terms of forecasting and reporting, and walk the walk to the revenue table by leveraging metrics that matter.

Tags : definitive, guide, marketing, metrics, analytics, marketo, roi, leans
    
By: TriNet     Published Date: Jan 17, 2012

Read this white paper to learn about 10 principles to follow in order to build an effective human capital plan for your organization.

Tags : trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, application integration, application performance management
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Turn     Published Date: May 06, 2014

What’s the best way to keep your brand safe while running cost-effective campaigns? How do you maximize reach and scale while avoiding undesirable contexts?

Tags : dwa, smart market, brand protection, digital advertising, unprecedented reach, deploy campaign, protection strategy, safeguards
    
By: IBM     Published Date: May 02, 2014

Leading companies automate their record to report processes. Learn how!

Tags : ibm, aberdeen group, big roi, companies automate, business intelligence, change management, external compliance, rtp
    
By: VictorOps     Published Date: Apr 30, 2014

Once businesses understand the value of uptime, they can substitute data for instinct when calculating operational expenses. This on-demand webinar will provide simple steps businesses can use to produce hard numbers and discuss the ways in which they can apply that data to evaluate and justify spending.

Tags : victorops, operational costs, operational expenses, business continuity, uptime, downtime, performance management, it spending
    
By: Dyn     Published Date: Mar 27, 2014

Having trouble reaching your customers’ inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are If your reputation is lower than you’d like just follow these 4 easy steps to start hitting the inbox.

Tags : dyn, sender reputation, ip and domain, warming an ip, ip addresses, email program, maintaining lists, spam trigger words
    
By: IBM     Published Date: Mar 20, 2014

This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances. The paper was developed by Enterprise Management Associates - an IT Analyst firm.

Tags : ibm, enterprise assets, it assets, data management, it management, enterprise asset management, ema, it organization
    
By: SAS     Published Date: Mar 14, 2014

This Q&A with Tom Davenport, Director of Research for the International Institute for Analytics (IIA), will help you understand how analytics is evolving, where you need to go, and how to get there.

Tags : sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives
    
By: SAS     Published Date: Mar 14, 2014

Stop to think about how - and how often - your business interacts with customers. Most organizations believe that only a small fraction of data on interactions generated are effectively put to use. Why is that? Check out this whitepaper to see.

Tags : sas, voc, voice of customer, visual text analytics, best practices, customer voice, sound of sentiment, text data
    
By: SAS     Published Date: Mar 14, 2014

This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.

Tags : sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
    
By: NAVEX Global     Published Date: Mar 04, 2014

If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your all-inclusive resource.

Tags : navex global, ethics and compliance, code of conduct, policy management, perspectives, assessment tools, best-practice, automation
    
By: IBM     Published Date: Mar 04, 2014

Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.

Tags : business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation
    
By: IBM     Published Date: Mar 04, 2014

The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?

Tags : business operations, business process management, bpm, process automation, smarter process, age of customer, business activity monitoring, business analytics
    
By: FireEye     Published Date: Feb 28, 2014

Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.

Tags : fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
By: IBM     Published Date: Feb 27, 2014

Learn about the evolution of business resiliency management and learn the best practices that are used in today's business resiliency management programs.

Tags : business resiliency, business resiliency management, management, best practices, ibm, planning, managing, resilience
    
By: Mashery     Published Date: Feb 06, 2014

Watch this video and learn how you can manage your APIs as full-fledged products without the steep engineering investment.

Tags : product management, enterprise, api, software, cloud, user experience, apps, applications
    
By: IBM     Published Date: Feb 04, 2014

Explore the top five practices in today's customer-data-driven supply chain and examine the impact of using customer data on key supply chain metrics.

Tags : ibm, aberdeen group, analytics report, customer data, data-driven, supply chain, best practices, social shopping
    
By: IBM     Published Date: Feb 04, 2014

As new technology and connected consumers redefine how business is done, IBM Smarter Commerce solutions help companies more effectively engage with customers across four critical aspects, which include the Buy, Market, Sell and Service components. This ebook outlines those areas and solutions for each.

Tags : ibm, smarter commerce, buy process, buy solutions, redefining marketing, connected consumers, market solutions, sales success
    
By: Panorama     Published Date: Jan 22, 2014

To help organizations evaluate their Business Intelligence needs, Panorama Software has built a vendor agnostic multi-vendor evaluation work sheet. Organizations can rank as many vendors as they wish in a spread sheet that contains over 150 features. All data is then aggregated into a results sheet, displaying your top options.

Tags : panorama, business intelligence, bi vendors, free tools, bi matrix, intelligence, buyers guide, data management
    
By: IBM     Published Date: Jan 09, 2014

To operate effectively in different markets, Finnish manufacturer Meka Pro needed to be able to adjust its pricing and manufacturing strategies to each locality, but had no insight into their own data. Read this case study to learn how Meka Pro used IBM® Cognos® software modules to make faster, better business decisions and improve profitability.

Tags : ibm, meka pro, analytics, improve profitability, manufacturing projects, business strategy, competition support, manufacturing strategies
    
By: CA Technologies     Published Date: Jan 06, 2014

Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.

Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
By: CA Technologies     Published Date: Jan 06, 2014

This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.