ibm security

Results 301 - 325 of 407Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : ibm, data, it security, data analytics
     IBM
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : identities, manage identities, manage application access, application access
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : security identity governance, access governance
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : security analytics platforms, ibm security, security analytics, security and risk
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
This IDaaS checklist will help you determine whether IBM Cloud Identity Service is right for you. Chances are - it is!
Tags : idaas, ibm cloud identity service, security
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Feb 08, 2018
Research commissioned by IBM reveals consumer preferences for identity authentication, including biometrics and multifactor authentication.
Tags : security, identity authentication, multifactor authentication
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : gdpr, ibm, compliance, ibm security
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : gdpr, ibm, compliance, ibm security
     Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : gdpr, ibm, compliance, ibm security
     Group M_IBM Q1'18
By: IBM     Published Date: Apr 13, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : gdpr, compliance, data protection, personal data
     IBM
By: IBM     Published Date: Apr 13, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : gdpr, compliance, data protection, personal data
     IBM
By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : gdpr, compliance, data protection, personal data
     IBM
By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : gdpr, compliance, data protection, personal data
     IBM
By: IBM     Published Date: Jun 09, 2010
Learn the correct way to create a secure application with this free white paper from IBM.
Tags : secure application, source code, penetration test, ibm, it security
     IBM
By: IBM     Published Date: Jun 09, 2010
Download this free IBM white paper to learn best practices for outsourcing application development.
Tags : application development, outsourced applications, ibm, it security
     IBM
By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : vulnerabilities, secure application, ibm, source code, software development, it security
     IBM
By: IBM     Published Date: Jun 09, 2010
Learn how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle with this free IBM white paper.
Tags : software delivery, data security, ibm, data protection, it security, web applications
     IBM
By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
     IBM
By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services, security, deployment, it management, platforms, business technology
     SilverSky
By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms
     SilverSky
By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption, business technology
     SilverSky
By: IBM     Published Date: Oct 10, 2013
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : workplace environment, enterprise, flexible workplace, ibm, enhance productivity, workplace environment, forward thinkers, achieve success, productivity, spur innovation, user mobility, user support, collaboration, security
     IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com