> Technology > Data Security
 

Data Security

Data Security
Results 201 - 225 of 289Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Oct 08, 2015
Download the white paper now and learn how to make your network "Ready for Mobile."
Tags : 
ibm, mobilefirst, network, security, data
    
IBM
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ibm, fiberlink, maas360, apple, ios
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
ibm, fiberlink, maas360, forrester, mobile
    
IBM MaaS360
White Paper Published By: IBM     Published Date: Oct 07, 2015
Based on our interviews with customers that are leveraging advanced analytics to drive more predictive outcomes for their companies, we found the following conclusions were consistent across all customers.
Tags : 
it management, data management, business technology, data center, data science
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM
Webinar Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions, security
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
ibm, cloud, analytics, mobile, social
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
This white paper explores IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : 
ibm, data center, next generation data center, software defined environment, data management
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
An IBM infographic highlighting the infrastructure implications of today’s converging technology forces and the software defined, data center transformation essential to capitalizing on them.
Tags : 
ibm, data center, software defined data center, data center transformation, it management
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : 
ibm, data security, big data, endpoint devices, safeguarding
    
IBM
White Paper Published By: VMware     Published Date: Oct 05, 2015
Unless you’ve already deployed a Zero Trust network, your network security is broken. That’s the bad news. The good news? New ways of implementing a previously hardware-intensive and costly concept called micro-segmentation now put Zero Trust within your organization’s reach. Learn about these breakthrough developments in this Forrester Research report that is yours free, courtesy of VMware and Carahsoft®. Download your free copy now.
Tags : 
vmware, zero trust, forrester research, network security, network security solution
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com