> Technology > Enterprise Applications > Business Activity Monitoring

Business Activity Monitoring

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 126 - 150 of 520Sort Results By: Published Date | Title | Company Name
White Paper Published By: CA Technologies     Published Date: Nov 12, 2014
This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.
Tags : 
optimizing it capacity, the demands on the it department, performance optimization, it management, application integration
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Nov 12, 2014
A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.
Tags : 
application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization
    
CA Technologies
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.
Tags : 
data loss prevention, dlp, healthcare, dlp best practices, data management
    
McAfee
White Paper Published By: SAS     Published Date: Nov 10, 2014
Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.
Tags : 
sas, data integration, data evolution, comprehensive data, data management
    
SAS
Free Offer Published By: Teradata     Published Date: Nov 06, 2014
As today’s marketing analytics requirements become increasingly cross-channel and real-time, your organization can’t risk crude integration between marketing and analytics assets. Together, these assets must work like a well-oiled machine. So what can you do? Should you integrate standalone marketing and analytics systems? Watch this to discover answers from industry experts.
Tags : 
teradata, business intelligence, marketing intelligence, marketing analytics, marketing automation
    
Teradata
White Paper Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services
    
IBM
White Paper Published By: Bazaarvoice     Published Date: Nov 05, 2014
How do shopping holidays like Cyber Monday and Boxing Day affect review usage? What does review traffic reveal about back-to-school shopping? Download The Conversation Index to see how customer conversations impact the global shopping seasons.
Tags : 
bazaarvoice, shopper conversations, social data, research peaks, holiday shoppers
    
Bazaarvoice
Webinar Published By: IBM     Published Date: Nov 03, 2014
Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.
Tags : 
infrastructure visibility, it complexity, search analytics, problem identification, it management
    
IBM
White Paper Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management
    
IBM
White Paper Published By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : 
it security breach, csirp, cyber threats, security, it management
    
IBM
White Paper Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, security
    
IBM
Case Study Published By: IBM     Published Date: Oct 14, 2014
Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.
Tags : 
disaster recovery, dr in-house, outsourcing, knowledge management, business activity monitoring
    
IBM
White Paper Published By: IBM     Published Date: Oct 10, 2014
Forrester Research has just completed a Total Economic Impact study for a large financial services institution to quantify the actual return on investment for service virtualization. Read Forrester’s analysis to learn how service virtualization is eliminating testing bottlenecks and significantly reducing the cost of testing.
Tags : 
ibm, virtualization, service virtualization, service components, deploying service
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2014
IBM’s Social Media Analytics solution helps your company take advantage of everything social media has to offer in terms of getting closer to your customers, combining social media analysis and reporting with IBM SPSS predictive analytics technology.
Tags : 
social media, advanced analytics, customer insight, social media analytics, knowledge management
    
IBM
White Paper Published By: Singlehop     Published Date: Oct 01, 2014
DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.
Tags : 
ddos attacks, it security, data breaches, security, it management
    
Singlehop
White Paper Published By: IBM     Published Date: Oct 01, 2014
This white paper discusses how IBM InfoSphere can support the integration and governance of Big Data in healthcare. The white paper reviews three case studies including predictive analytics with Electronic Medical Records, time series data in a neonatal intensive care unit and predictive pathways for disease.
Tags : 
big data, data integration, healthcare, data management, business activity monitoring
    
IBM
White Paper Published By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : 
firewall, firewall protection, it security, cyber defense, security
    
Arbor
Webinar Published By: IBM     Published Date: Sep 15, 2014
Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.
Tags : 
software delivery, idea tracking, monitoring, software development, application performance management
    
IBM
White Paper Published By: IBM     Published Date: Sep 15, 2014
This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.
Tags : 
global banking, banking solutions, fis outsourcing, banking information technology, flash technology
    
IBM
White Paper Published By: IBM     Published Date: Sep 15, 2014
In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.
Tags : 
data center economics, application performance, critical data, big data, flash storage
    
IBM
Webinar Published By: TeamQuest     Published Date: Sep 05, 2014
Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis
Tags : 
business activity monitoring, business intelligence, project management, service management
    
TeamQuest
White Paper Published By: TeamQuest     Published Date: Sep 04, 2014
Enterprise Holdings (EHI) is the corporate parent of Enterprise Rent-A-Car, Alamo Rent A Car, National Car Rental and Enterprise CarShare. With annual revenues of $16.4 billion and more than 78,000 employees, EHI and its affiliates own and operate almost 1.4 million cars and trucks. This makes it the largest car rental service provider in the world measured by revenue, employees and fleet.
Tags : 
business metrics, automated forecasting, automated data collection, business activity monitoring, it spending
    
TeamQuest
White Paper Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence
    
TIBCO
Free Offer Published By: Lancope     Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
Tags : 
lancope, cyberattack, cyber criminals, network security, hackers
    
Lancope
White Paper Published By: IBM     Published Date: May 02, 2014
Leading companies automate their record to report processes. Learn how!
Tags : 
ibm, aberdeen group, big roi, companies automate, business intelligence
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.