ibm security

Results 326 - 350 of 402Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure, system security, ibm pureflex, intrachassis communication, security, storage, data center
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : 
ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise, mobile device platform, it management, malware, spam, phishing, bluetooth, wi-fi, theft, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
This white paper discusses the key market trends and challenges facing organizations as they seek to deploy mobile enterprise solutions and examines the growing requirements of these firms. It also delivers an overview of how enterprises can address the challenges in terms of repackaging and optimizing applications to better operate in a converged, dynamic mobile world.
Tags : 
ibm, mobile, mobile enterprise, market trends, deployment, mobile enterprise solutions, applications, application performance, mobile enterprise adoption, byod, security, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : 
ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
IBM
Published By: IBM     Published Date: Jun 26, 2014
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
IBM
Published By: IBM     Published Date: Jun 26, 2014
Achieve more stable, effective and manageable endpoint security with Stateful Application Control.
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security, it management
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
To gain fast access to patient records, Kochi Medical School Hospital in Japan struggled to use aging mobile devices that were unreliable and expensive to repair. Read the case study to learn how the hospital used IBM Mobility Services and desktop cloud to deploy hundreds of mobile devices at a lower per-device cost in a security-rich cloud environment. IBM helped the hospital achieve anywhere, anytime access to patient records; maintain the confidentiality of patient medical information; improve patient care coordination; and increase staff productivity.
Tags : 
ibm, mobile computing, mobile computing system, cloud services, productivity, technology services, cloud platform, mobility, it management
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : 
ibm, security, cyber security, security intelligence, big data, visibility, threat detection
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders said that staffing issues contribute to heightened levels of risk.
Tags : 
ibm, security, technical security, forrester report, it security, security staffing
    
IBM
Published By: IBM     Published Date: Jul 22, 2014
Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
ibm, storage, back up, recovery, cost reduction, data, it environments, data protection, security, virtual environments, core application, remote sites
    
IBM
Published By: IBM     Published Date: Oct 07, 2014
A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.
Tags : 
ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions, vulnerabilities, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : 
it security breach, csirp, cyber threats, security, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, security, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : 
flexible workplace, user mobility, user support, productivity management, it management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : 
security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, business technology
    
IBM
Published By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : 
ibm, healthcare, security, data, cybercrime
    
IBM
Published By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : 
ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM
Published By: IBM     Published Date: Oct 20, 2016
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly "wow" your team.
Tags : 
ibm, security, ciso, cloud iam, identity service device, idaas, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 20, 2016
Choosing a vendor for Cloud IAM is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options-and share the findings with the rest of your team.
Tags : 
ibm, security, ciso, iam, cloud iam, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Learn about AT&T and IBM's Private Cloud Partnership and see how AT&T excelled their business and performance through this partnership.
Tags : 
at&t, ibm, private cloud, network, security, performance, reliability
    
IBM
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep, web portal
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com