IT Management  >   Systems Operations  >   Applications Management  >  

Application Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Applications Monitoring
DEFINITION: The process of detecting and reporting problems with the proper operation of an application.
Application Monitoring Reports
1 - 25 of 382 Matches Previous Page  |  Next Page
Building the Right Switching Architecture for New Business-Critical Applications
sponsored by Juniper Networks, Inc.
WEBCAST: Watch this webcast to discover how you can simplify your network for an architecture that supports today's IT landscape.
Posted: 26 Mar 2015 | Premiered: Dec 31, 2014

Juniper Networks, Inc.

Manage Your Applications in a Software Defined World
sponsored by Citrix
WEBCAST: Watch this on-demand joint webinar with Firefly to learn how to easily move from ACE to NetScaler and how this leads to a fully virtualized network integrating with Nexus switches today, and a software defined application infrastructure with Cisco ACI.
Posted: 26 Mar 2015 | Premiered: Dec 11, 2014

Citrix

F5 and Vmware: Optimizing Desktop Virtualization and Delivering Benefits
sponsored by F5 Networks
WHITE PAPER: Access this informative white paper to learn more about implementing VDI for your organization. Read on to learn about potential benefits like improved application accessibility and reliability, better application upgrades and maintenance, enhanced backup and recovery capabilities, and more.
Posted: 24 Mar 2015 | Published: 31 Aug 2014

F5 Networks

The Key to Unlocking Application Problems Lies in End User Response Time
sponsored by Fluke Networks.
WHITE PAPER: This exclusive white paper explains how network engineers who shift their focus to end user response times are positioning themselves to solve the problem of slow performance. Read more to learn how you can measure end user response times and start to conquer slow performance.
Posted: 24 Mar 2015 | Published: 06 Feb 2015

Fluke Networks.

The Processes of an Application Security Program
sponsored by Veracode, Inc.
WEBCAST: In this video, you can view a demo of how one application security program works.
Posted: 20 Mar 2015 | Premiered: Mar 4, 2014

Veracode, Inc.

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

How to Automate User Provisioning
sponsored by OneLogin
WEBCAST: This webcast explores the risk of cloud applications and how you can ensure secure application management for your enterprise.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Get Out of the Mud of Sinking IT and Business Productivity
sponsored by Ipswitch File Transfer
WHITE PAPER: Access this white paper to learn about 5 challenges that IT leaders commonly face with network performance and low user productivity, as well as their solutions.
Posted: 13 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

The Evolution of the SysAdmin & Holistic Monitoring for Apps & Servers
sponsored by SolarWinds, Inc.
VIDEO: Tune into this video to hear from SolarWinds and Matt Simmons, SysAdmin Blogger as they present an inside look at the evolving role of System Administrators and the future of application and server monitoring.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

SolarWinds, Inc.

Eliminate the finger pointing and narrow down application performance issues in minutes
sponsored by SolarWinds, Inc.
RESOURCE: View this resource to discover an interview with a CTO of an IT consulting firm that focuses on application performance issues.
Posted: 11 Mar 2015 | Published: 15 Jan 2015

SolarWinds, Inc.

Top 3 Identity Management Considerations When Implementing Google Apps for Work
sponsored by OneLogin
WHITE PAPER: In this white paper, explore the three Google Apps Directory Services (GADS) limitations and what it means for your organization. View now to learn how to overcome these challenges.
Posted: 11 Mar 2015 | Published: 03 Mar 2015

OneLogin

Get Your Act Together With The Right Monitoring Solution
sponsored by AppDynamics
WHITE PAPER: This white paper takes a look at DevOps use cases that benefit from behavioral learning and analytics.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

AppDynamics

Get Ahead of Competitors With Mobile Applications
sponsored by AppDynamics
WHITE PAPER: This white paper highlights several important considerations for planning, building and launching a mobile application in order to ensure a good experience for your end users, and a good outcome for your business.
Posted: 06 Mar 2015 | Published: 31 Dec 2014

AppDynamics

The Wizards behind Google Apps
sponsored by Datto, Inc.
WHITE PAPER: Google Apps is a dynamic collaboration platform that enables people to communicate better and be more productive. This eye-opening resource pulls back the curtain to take a look at a panel of experienced IT managers who are responsible for keeping Google Apps running in their organizations.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Datto, Inc.

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

The Complete Guide To Google Apps Security
sponsored by Datto, Inc.
WHITE PAPER: In this helpful guide, explore the available additional protection services and technologies for securing data stored in Google's cloud.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Datto, Inc.

Shedding Light on the Cloud App Blind Spot
sponsored by Imperva
WHITE PAPER: Unfortunately, cloud applications can come with a large number of potentially hazardous blind spots. This white paper intends to shed light on these areas and will cover why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

Imperva

The 3 Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.
Posted: 02 Mar 2015 | Published: 04 Dec 2014

Veracode, Inc.

Case Study: App Code Security from the Ground Up
sponsored by Veracode, Inc.
WEBCAST: View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.
Posted: 02 Mar 2015 | Premiered: Jul 7, 2014

Veracode, Inc.

Reality Checking your Security Testing Program
sponsored by Veracode, Inc.
VIDEO: How do you know if your security testing protocols are actually fully effective? This webcast demonstrates what you need to know to ensure that your security testing methods are running as they should.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

How to improve productivity through mobile UX design
sponsored by Unisys
EGUIDE: This expert e-guide highlights the importance of mobile user experience and how an unsatisfying experience with an app can bring consequences to an organization. Discover more about user experience analysis and design as well as the use of a mobile application performance monitoring system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015


Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.

Cognos: BI: IBM Cognos 10 — Enhancing Query Processing Performance for SAP NetWeaver Business Warehouse
sponsored by IBM
WHITE PAPER: This white paper discusses these new, extremely powerful developments for Cognos 10 in detail.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

Detecting Web App Vulnerabilities Before Hackers Do
sponsored by IBM
SOFTWARE DOWNLOAD: View now to learn how a web application analysis tool detects your web app vulnerabilities and compiles them in an easy to read security report to help you remediate faster. View now to learn more.
Posted: 24 Feb 2015 | Premiered: 18 Feb 2015

IBM

App Security: Going Beyond Scanning and Remediation
sponsored by Veracode, Inc.
WHITE PAPER: This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.
Posted: 24 Feb 2015 | Published: 09 Jul 2014

Veracode, Inc.
1 - 25 of 382 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement