ibm security

Results 351 - 375 of 415Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : it security breach, csirp, cyber threats, security, it management
     IBM
By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : security operations, deployment, service delivery, problem management, security, it management
     IBM
By: IBM     Published Date: Oct 14, 2014
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : flexible workplace, user mobility, user support, productivity management, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, business technology
     IBM
By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : ibm, healthcare, security, data, cybercrime
     IBM
By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
     IBM
By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
     IBM
By: IBM     Published Date: Oct 20, 2016
Adopting Identity as a Service (IDaaS), also known as Cloud IAM, can reduce your IT costs, but how do you convince your organization to take the leap? Use this TCO guide to compare the cost of on-premises and cloud-based IAM, such as IBM Cloud Identity Service. Then, calculate your three-year cost savings to truly "wow" your team.
Tags : ibm, security, ciso, cloud iam, identity service device, idaas, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Oct 20, 2016
Choosing a vendor for Cloud IAM is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options-and share the findings with the rest of your team.
Tags : ibm, security, ciso, iam, cloud iam, enterprise applications, business technology
     IBM
By: IBM     Published Date: Feb 27, 2014
Learn about AT&T and IBM's Private Cloud Partnership and see how AT&T excelled their business and performance through this partnership.
Tags : at&t, ibm, private cloud, network, security, performance, reliability
     IBM
By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep, web portal
     IBM
By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : ibm, ibm mi, ibm grm, web security, internet security, application security, security
     IBM
By: IBM     Published Date: Sep 18, 2008
It’s a changing climate for network security and demands for improved documentation of regulatory compliance continue to increase. The time has come for a comprehensive, cost-effective, scalable security event and log management solution. Read this white paper for more information about the IBM solution that answers this challenge.
Tags : ibm, ibm, mmdg, security management, security data management, data management
     IBM
By: IBM     Published Date: Sep 18, 2008
Organizations of all sizes need security that can adapt to their ever-changing environments. IBM Managed Security Services can help you integrate security with business processes for increased flexibility, efficiency and productivity. Read this white paper to learn how IBM can put you in the driver’s seat with protection on demand.
Tags : ibm, ibm mmdg, managed security, productivity, security, it management
     IBM
By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy
     IBM
By: IBM     Published Date: Dec 03, 2008
Affordable System x Express servers from IBM include features designed to keep your data safe and rapidly accessible. This e-kit includes white papers, datasheets and product guides for individual products, as well as overviews that help you compare systems and storage solutions so you can choose what works best for your business.
Tags : ibm express seller, data protection, security, ibm, data security, storage solutions, data management
     IBM
By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications, data management
     IBM
By: IBM     Published Date: Mar 04, 2009
As a small to midsize business owner, you understand that in order to grow, you need to be able to communicate and collaborate with people, quickly and easily. But you have limited budgets and IT resources. You want security-rich solutions that will extend your assets, improve operating efficiencies and grow as your company grows. IBM offers you reliable solutions that can help you compete with your larger counterparts.
Tags : ibm, lotus, lotus complete messaging, communication and collaboration, security-rich solutions, business-grade instant messaging, ibm lotus domino, web conferencing, voip, lotus sametime, security, enterprise applications
     IBM
By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, wireless, enterprise applications
     IBM
By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment
     IBM
By: IBM     Published Date: Aug 30, 2010
This white paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Tags : ibm, data privacy, sensitive data, identity theft, security
     IBM
By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso, business leaders, security program
     IBM Corporation
By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : ibm, guardium, database, audit, security, risk, monitoring, webcast
     IBM Corporation
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
     IBM Corporation
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com