> Technology > Enterprise Applications > Business Activity Monitoring

Business Activity Monitoring

Business Activity Monitoring (BAM) is software that aids in monitoring of business processes, as those processes are implemented in computer systems. BAM is an enterprise solution primarily intended to provide a realtime summary of business processes to operations managers and upper management. As such, BAM presents dashboards that contain key performance indicators (KPI) that support root cause analysis and alerts that warn of impending problems.
Results 251 - 275 of 520Sort Results By: Published Date | Title | Company Name
Webinar Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
This 30- minute webcast recording reviews the basics of project management and reporting for government contractors. Based on content from the Deltek Special Edition Government Contracting for Dummies e-book.
Tags : 
project management, government contractors, reporting, spending, budget management
    
Deltek - Nethawk
White Paper Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
In this white paper we explore how smaller contractors can now have access to robust and compliant solutions via the cloud, thus removing the IT and cost barriers that previously kept these solutions out of reach.
Tags : 
smb, government contractors, cloud solutions, cloud computing, cloud
    
Deltek - Nethawk
Webinar Published By: TeamQuest     Published Date: Mar 04, 2013
Watch how a global capacity management team managed service levels after multiple bank acquisitions.
Tags : 
performance management, optimization, capacity management, network, managed service
    
TeamQuest
White Paper Published By: Concur     Published Date: Mar 04, 2013
When the policy says one thing and people do something different, the disconnect causes problems. Build a Company Culture that is integrated with compliance.
Tags : 
company culture, expense policy, compliance, expense management, applications
    
Concur
White Paper Published By: IBM     Published Date: Feb 21, 2013
Disclosure management tools ave transformed the so called ‘Last Mile’ of finance, turning a haphazard, time consuming and error-prone process into a much more streamlined, timely and controlled endeavor.
Tags : 
disclosure management, finance, statutory, reporting, process management
    
IBM
White Paper Published By: IBM     Published Date: Feb 21, 2013
With this book, you find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. You also discover features of the ideal CCR solution and learn what to look for in the selection process.
Tags : 
close, consolidate, report, ibm, ccr
    
IBM
White Paper Published By: IBM     Published Date: Feb 21, 2013
Read this book to discover the benefits and value of a single, integrated, financial reporting and disclosure management platform that automate the production of these critical reports.
Tags : 
automation, last mile, finance, sec, xbrl
    
IBM
White Paper Published By: IBM     Published Date: Feb 20, 2013
This paper reviews the processes involved in a company’s extended financial close process, the problems associated with a manual effort, and the benefits of using an integrated and automated single-platform solution for Financial Close Management.
Tags : 
fcm, financial close management, finance, close, extended cycle
    
IBM
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : 
security management platform, siem, log management, security management 2.0, anti spam
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring
    
McAfee
White Paper Published By: dynatrace     Published Date: Feb 01, 2013
This paper describes how Compuware dynaTrace, part of the Compuware APM solution, bridges the gap between business and IT by bringing together Business Transaction Management (BTM) and Application Performance Management (APM) in a single system.
Tags : 
application integration, application performance management, best practices, business activity monitoring, business management
    
dynatrace
White Paper Published By: dynatrace     Published Date: Feb 01, 2013
Studies have shown that poor performance of e-commerce web sites can directly result in loss of revenue, poor customer satisfaction and damaged reputation. This white paper provides an overview to application performance management for e-commerce.
Tags : 
application performance management, best practices, business activity monitoring, business management, enterprise software
    
dynatrace
White Paper Published By: dynatrace     Published Date: Feb 01, 2013
New application performance management systems can deliver rapid time-to-value and ROI for IBM WebSphere implementations by reducing the amount of time isolating problems and repairing them throughout the entire WebSphere stack.
Tags : 
application performance management, best practices, business activity monitoring, business management, corporate governance
    
dynatrace
White Paper Published By: dynatrace     Published Date: Feb 01, 2013
Read this paper to learn how you can unify and communicate effectively between teams throughout the application lifecycle to maximum the application performance that is the lifeblood of your organization’s business operation.
Tags : 
application, lifecycle, performance, development, testing
    
dynatrace
White Paper Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, network security, enterprise, infrastructure, best practices
    
HP - Enterprise
White Paper Published By: Heroix     Published Date: Jan 23, 2013
An application and network performance monitoring tool can be the means to meet larger corporate goals of reduced costs, operational efficiency, and time savings for IT and other staff.
Tags : 
it performance monitoring, sla, service level agreement, network, consolidation
    
Heroix
White Paper Published By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : 
dlp, data-centric dlp, data leakage, dlp deployment, business continuity
    
McAfee
Webinar Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : 
security, network security, network protection, data security, data protection
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : 
encryption, bitlocker, data protection, endpoint, security
    
Lumension
Case Study Published By: Riverbed     Published Date: Jan 16, 2013
In this report, Taneja Group explores how Riverbed Technology has identified a critical challenge that limits IT performance in highly distributed customer environments: costly, complex, and hardware-heavy branch offices.
Tags : 
wan, mobile, it infrastructure, virtualization, vsp
    
Riverbed
Case Study Published By: Riverbed     Published Date: Jan 16, 2013
With Steelhead CX and Granite appliances in its Toronto data center and Steelhead EX appliances in Mexico and Turkey, Alamos found a consolidated approach for deploying IT in distant locations.
Tags : 
servers, wan, vsp, roi, infrastructure management
    
Riverbed
Webinar Published By: CollabNet     Published Date: Jan 13, 2013
These resources discuss the need to include long term product vision, coherent user experience and User Centered design and architecture along with specific best practices for achieving a coherent product that delights users.
Tags : 
scrum, software development, strategy, agile, project management
    
CollabNet
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.