Business Activity Monitoring White Papers

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 1 - 25 of 412Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 10, 2014

Forrester Research has just completed a Total Economic Impact study for a large financial services institution to quantify the actual return on investment for service virtualization. Read Forrester’s analysis to learn how service virtualization is eliminating testing bottlenecks and significantly reducing the cost of testing.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: TeamQuest     Published Date: Sep 05, 2014

Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis

Tags : business activity monitoring, business intelligence, project management, service management
    
By: TeamQuest     Published Date: Sep 04, 2014

Enterprise Holdings (EHI) is the corporate parent of Enterprise Rent-A-Car, Alamo Rent A Car, National Car Rental and Enterprise CarShare. With annual revenues of $16.4 billion and more than 78,000 employees, EHI and its affiliates own and operate almost 1.4 million cars and trucks. This makes it the largest car rental service provider in the world measured by revenue, employees and fleet.

Tags : business metrics, automated forecasting, automated data collection, business activity monitoring, it spending, project management
    
By: IFS     Published Date: Dec 27, 2012

Realize the benefits of consolidating your ERP products down to one.

Tags : erp, enterprise resource planning, enterprise, integration, process management, project management, application integration, application performance management
    
By: Marketo     Published Date: Jul 31, 2012

The Definitive Guide to Marketing Metrics and Marketing Analytics shows marketing professionals how to talk the talk of C-level executives in terms of forecasting and reporting, and walk the walk to the revenue table by leveraging metrics that matter.

Tags : definitive, guide, marketing, metrics, analytics, marketo, roi, leans
    
By: TriNet     Published Date: Jan 17, 2012

Read this white paper to learn about 10 principles to follow in order to build an effective human capital plan for your organization.

Tags : trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, application integration, application performance management
    
By: IBM     Published Date: Oct 14, 2014

Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

Tags : ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.

Tags : it security breach, csirp, cyber threats, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.

Tags : security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

Tags : disaster recovery, dr in-house, outsourcing, knowledge management, business activity monitoring, business analytics, business intelligence
    
By: IBM     Published Date: Oct 06, 2014

IBM’s Social Media Analytics solution helps your company take advantage of everything social media has to offer in terms of getting closer to your customers, combining social media analysis and reporting with IBM SPSS predictive analytics technology.

Tags : social media, advanced analytics, customer insight, social media analytics, knowledge management, business activity monitoring, business analytics, business integration
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: IBM     Published Date: Oct 01, 2014

This white paper discusses how IBM InfoSphere can support the integration and governance of Big Data in healthcare. The white paper reviews three case studies including predictive analytics with Electronic Medical Records, time series data in a neonatal intensive care unit and predictive pathways for disease.

Tags : big data, data integration, healthcare, data management, business activity monitoring, business analytics
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: IBM     Published Date: Sep 15, 2014

Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.

Tags : software delivery, idea tracking, monitoring, software development, application performance management, best practices, business activity monitoring
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: IBM     Published Date: Sep 15, 2014

In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.

Tags : data center economics, application performance, critical data, big data, flash storage, storage system, data management, storage management
    
By: destinationCRM.com     Published Date: Sep 08, 2014

Two sweeping trends have emerged in recent years: the proliferation of customer channels and the resulting explosion in the amount of data produced. This whitepaper focuses on how Knowledge Management adds an essential layer of value to customer-facing systems, which ultimately drives improved customer experiences.

Tags : crm, knowledge management, customer service, customer relationship management, customer data, consumer data, consumer analytics, best practices
    
By: IBM     Published Date: Sep 02, 2014

To get timely and trusted insights from Risk Analytics while minimizing IT risk and improving time-to-value, IBM is delivering an Application Ready Solution for Algorithmics. This integrated offering, anchored on a validated scalable high-performance clustered reference architecture, delivers the timely risk insights firms need to lower Tier 1 capital.

Tags : ibm, risk management, risk analytics, data analytics, finance reports, business analytics, business activity monitoring, business management
    
By: TIBCO     Published Date: Aug 18, 2014

Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.

Tags : tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: IBM     Published Date: May 02, 2014

Leading companies automate their record to report processes. Learn how!

Tags : ibm, aberdeen group, big roi, companies automate, business intelligence, change management, external compliance, rtp
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.