data security

Results 1526 - 1550 of 2005Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : ibm, data security, big data, endpoint devices, safeguarding, security, it management, data management, business technology, data center
     IBM
By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal, software development, enterprise applications
     IBM
By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data, security, compliance, information
     IBM
By: IBM     Published Date: Feb 26, 2016
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : data center, cloud computing, analytcs, mobile, social, cyber security, ibm
     IBM
By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : ibm, network, cloud, analytics, mobile, social, big data, it security, networking, security, enterprise applications, business technology
     IBM
By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : ibm, data security, risk management, data management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : ibm, identity governance, risk control, risk management, data security, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 06, 2016
By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.
Tags : ibm, data security, data security, ibm security gaurdium, security
     IBM
By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : ibm, big data, data security, risk management, security
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
     IBM
By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : ibm, gartner, data, dcap, data-centric audit protection, security, knowledge management, enterprise applications, data management
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization, data management
     IBM
By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : ibm, data, security, big data, data management
     IBM
By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your data—and your business.
Tags : ibm, b2b, commerce, b2bi, business to business integration, integration, forrester, data security, privacy, security, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : ibm, data, big data, safeguard, sensitive data, security, dbms, data management, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : ibm, data, big data, security, data loss, data protection, threat provention, knowledge management, enterprise applications, data management
     IBM
By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : ibm, security, data, privacy, forrester, forrester research, data management, business technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : ibm, security. big fix, infirmary health system, case study, esm technology, networking, security, enterprise applications, data management
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
     IBM
By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : ibm, security. big fix, infirmary health system, case study, esm technology, security, enterprise applications, business technology
     IBM
By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
     IBM
Start   Previous    55 56 57 58 59 60 61 62 63 64 65 66 67 68 69    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com