database monitoring

Results 1 - 25 of 52Sort Results By: Published Date | Title | Company Name
Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring, network monitoring, infrastructure performance monitoring, infrastructure monitoring, business transaction management, end-user experience monitoring, end-user monitoring, real-user monitoring, operations analytics, cloud performance monitoring, web performance monitoring, database performance monitoring, citrix performance monitoring
    
ExtraHop
Published By: Microsoft Carat APAC     Published Date: Dec 12, 2017
Web apps once thought impossible due to scale, complexity, or because they simply couldn’t be imagined, are now a reality with the cloud. In this guide, we’ve explored the Azure App Service and highlighted Azure’s support for platform as a service (PaaS). We’ve shown you how you can take an existing website backed by a SQL Server database and move it to the cloud. You’ve seen how you can easily add features such as identity management and caching to your web app. You’ve also learned that you can enable rich application monitoring with a few clicks.
Tags : 
code, business, optimization, scale, support, cloud, paas
    
Microsoft Carat APAC
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
The Wales Home selected the STANLEY Healthcare AeroScout Resident Safety solution because of its ability to protect residents throughout the building and grounds, with every resident carrying a personal pendant to call for help at any time. Alerts are automatically directed to staff via Apple iPod® mobile digital devices, and activity is captured in a database for analysis. The Wales Home is also leveraging the AeroScout platform for temperature monitoring of its server room and refrigeration units. Read this case study to learn more about how The Wales Home increases resident safety and autonomy with STANLEY Healthcare’s AeroScout® Solutions.
Tags : 
resident safety, healthcare, nurse call systems, wi-fi, mobile devices, temperature monitoring
    
STANLEY Healthcare
Published By: Riverbed     Published Date: May 18, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs and your ability to provide governance will determine the success level of your entire enterprise. With complexity growing at such a hyperbolic rate, in the future, automated application discovery and dependency mapping will not just be useful -it will be mandatory.
Tags : 
service management, management software, infrastructure, devops, cloud performance monitoring, application monitoring, database monitoring, end user experience monitoring, transaction monitoring, data management, business technology
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.
Tags : 
service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management, network management, network performance, application integration, application performance management, best practices, business integration, business management
    
Riverbed
Published By: Dell Software     Published Date: Feb 19, 2014
When application performance issues occur, it seems DBAs get blamed – even if databases aren’t the cause. In this new white paper, see how to maintain peak database performance at all times – and how to prove, beyond a doubt, your databases aren’t causing the headaches! Read this paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development
    
Dell Software
Published By: Dell Software     Published Date: Feb 19, 2014
Go beyond one-dimensional virtual machine performance. Foglight for Virtualization helps you visualize, analyze and optimize your entire virtual infrastructure health. In this technical brief, learn how Foglight simplifies cross-platform database performance monitoring and management. Read it today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
Dell Software
Published By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
Dell Software
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware, anti virus, application security, compliance, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, patch management, security management
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity, compliance, email security, hacker detection, internet security, intrusion detection, intrusion prevention, security management, vulnerability management, data loss prevention
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, email security, encryption, internet security, intrusion detection, intrusion prevention, network security appliance
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, anti spam, anti spyware, compliance, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management, data loss prevention
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba, sox, cobit, iso, hipaa, fisma, database activity monitoring, database vulnerability manage, database activity monitoring, anti spyware, anti virus, auditing, compliance
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam, anti spyware, anti virus, ddos, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management, mobile device management
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit, anti spam, anti spyware, anti virus, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management, data loss prevention
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae, access control, anti spam, anti spyware, anti virus, auditing, business continuity, compliance, disaster recovery, encryption
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting, anti spyware, anti virus, auditing, ddos, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management, virtualization, cloud computing
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors, anti spam, anti spyware, anti virus, application security, compliance, encryption, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
McAfee
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.