Vertical Industries  >  

Logging industry

RSS Feed    Add to Google    Add to My Yahoo!
Logging industryReports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Security at Scale: Logging in AWS
sponsored by Amazon Web Services
WHITE PAPER: Amazon Web Services (AWS) provides a service to record API calls and resource changes that helps alleviate on-premises infrastructure and storage challenges. Continue on to learn about common compliance requirements related to logging, and how AWS can help.
Posted: 10 Jul 2014 | Published: 30 Nov 2013


Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Understanding the Advanced Persistent Threat
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

Log Management: How to Develop the Right Strategy for Business and Compliance
sponsored by Dell SecureWorks UK
WHITE PAPER: Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks UK

Transitioning from Log Management and SIEM to Security Intelligence
sponsored by IBM
WHITE PAPER: Learn how security intelligence empowers organizations to maintain comprehensive and cost-effective threat prevention and risk aversion.
Posted: 04 Nov 2013 | Published: 01 Jan 2013

IBM

How to Leverage Desktop Virtualization in the Financial Industry
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper details a few scenarios in which VDI is best suited to meet the special requirements and budgetary constraints of datacenters that support financial service companies.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Dell, Inc.

IBM FlashSystem in securities industry
sponsored by IBM
WHITE PAPER: In this white paper, you will gain insight on solid state storage as drives, disks, and arrays. Check it out now to discover the broad characteristics of solid state storage and how it can improve your I/O performance.
Posted: 26 Jun 2013 | Published: 30 Apr 2013

IBM

Big data: New insights transform industries
sponsored by IBM
WHITE PAPER: Access the following white paper to uncover how companies are leveraging new analytics technology and practices to stay ahead of the big data curve. Discover how you can gain the actionable intelligence you need and what you can do to gain a sharper competitive edge.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

IBM

Machine data equals big value for analytics programs
sponsored by TechTarget
RESOURCE: Sensors and log files capture large volumes of data about industrial equipment and other machines. With a lot of refining, big data analytics can turn that raw material into useful information. Take this short survey to access an e-guide to arm you with the insight to gain real business value from the exceedingly large volumes of data.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover why financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 26 Mar 2014 | Published: 31 Mar 2013

IBM

Leverage Security Intelligence For Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

How social media drives business success
sponsored by ComputerWeekly.com
IT BRIEFING: There is a growing recognition that rather than being a distraction or a time drain, social tools could hold the key to a more productive way of doing business, this report from Google argues.
Posted: 21 May 2012 | Published: 21 May 2012

ComputerWeekly.com

E-Guide: Selecting a SIM for midmarket business
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

Debunking APT myths: What it really means and what you can do about it
sponsored by SearchSecurity.com
EGUIDE: This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

SearchSecurity.com

SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

Case Study: Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 03 May 2013 | Published: 31 Jan 2013

Hewlett-Packard Company

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett-Packard Company
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Symmons Industries turns up the pressure on larger competitors with IBM Business Analytics software
sponsored by IBM
WHITE PAPER: Access this fascinating case study today to see how Symmons - a mid-sized, US-based manufacturer in the plumbing industry - implemented expert solutions that enabled production-line staff to adapt manufacturing schedules and meet demands in real time, and much more!
Posted: 05 Nov 2013 | Published: 05 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement