Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ibm ep

Results 276 - 300 of 504Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 11, 2015
Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, credentials theft, identity management policies, anti-malware software, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies, it management
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security, security
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions, productivity, reputation
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions, security, it management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web, i2p
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
Join Steve Mirman, IBM MobileFirst solution architect, for this deep-dive intro into how you can speed development, simplify deployment and actively manage all of your mobile apps with a single, analytics-based console using our Platform in the cloud.
Tags : 
ibm, mobile, application, development, mobilefirst platform, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : 
ibm, gartner, magic quadrant, identity governance, administration, networking, security
    
IBM
Published By: IBM     Published Date: Jan 14, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : 
ibm, biginsights, bigintegrate, bigquality, data, ecosystem, governance, integration
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
With Watson Explorer, you can keep enterprise search as the foundation and transform search into Cognitive Exploration. Leveraging technological advances such as deep search and exploration, advanced content analytics, and cognitive capabilities, IBM Watson Explorer provides a unified view of the information you need, combining data from multiple internal silos and a variety of outside datasets including social media. Stop limiting your search to traditional data sources in the new, non-traditional data world.
Tags : 
watson explorer, ibm, deep search, content analytics, enterprise software
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
IBM Sametime and IBM Connections Meetings Cloud are named a Leader in the recent Ovum Decision Matrix report.
Tags : 
ibm, ovum, virtual meetings, online meetings, teleconferencing
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Learn about the latest IBM DevOps solutions for IBM z Systems mainframe that can accelerate and simplify deployments. Attend this session to find out about leveraging skills and teams dealing with multiple tools, processes and platforms.
Tags : 
ibm, z systems, devops, software delivery, it management, enterprise applications, cloud computing
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments. "
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas, security, cloud computing
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, ponemon institute, ibm security qradar, siem, security, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: May 09, 2016
Reliable Transportation For Dummies, IBM Limited Edition, shows you what you need to know about what it takes to keep a fleet operating efficiently while keeping maintenance expenses in check. In other words, this book provides information and ideas about what you can do to have a reliable fleet operation that doesn’t break the bank with either unforeseen breakdowns or out-of-control maintenance expenditures.
Tags : 
ibm, watson, internet of things, iot, transportation, reliable transportation, operational efficiency
    
IBM
Published By: IBM     Published Date: May 25, 2016
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization by helping to: - Enable faster and more agile change so your business can react more quickly to opportunities and threats - Automatically capture knowledge so it can be reused to make better business decisions - Manage compliance better by providing a clear record of the rules that govern business operations - Make operational decisions more predictable and repeatable while also allowing you to model, measure, collaborate on and refine these decisions as your business needs change - Improve customer service with more consistent and accurate rules-based decisions, as well as by personalizing the user experience
Tags : 
ibm, odm, operational decision management, odm, middleware, connect, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments.
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas, security, enterprise applications
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.