Techworld

Monitoring Whitepapers


Sort by: Date | Company | Title


How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
By APC | 6/5/2014
Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014
This report assesses the current state and effectiveness of vulnerability management.
Download this now


Best Practices in Data Protection Monitoring
By EMC | 28/2/2014
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Download this now


Traversing Energy Markets
By Kaseya | 18/2/2014
For a number of industries, there is room for delays caused by poor performance of IT infrastructure, and the importance of a solid monitoring system has never been greater. Read about how the Midcontinent Independent System Operator was able to tackle this challenge and effectively administer one of the world’s largest energy markets.
Download this now


Threat Monitoring; Fast Responses To Security Incidents
By Websense | 14/11/2013
As threats evolve and the effectiveness of signature based web security declines, IT departments need to play a bigger, more hands-on role in web security than ever before. In this whitepaper, we look at real-time advanced threat defences that provide immediate visibility into advanced threats, data exfiltration and infected systems.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers