Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 201 - 225 of 1372Sort Results By:Published Date | Title | Company Name
By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, ibm x-force, ibm security portfolio, threat intelligence, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : ibm, ibm security network, ips gx7800, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : ibm, network protection, ibm security network protection, network security, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : ibm, data security, risk management, data management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : ibm, identity governance, risk control, risk management, data security, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : ibm, security intelligence services, ibm security intelligence solution, cloud, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : ibm, ponemon institute, ibm security qradar, siem, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, global, ponemon institute, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : ibm, data breach, united states, ponemon institute, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : ibm, hybrid it operations, cloud, mss, managed security services, it management, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : ibm, managed security services, hybrid it operations, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, cybersecurity, ibm emergency response services, cyber crime trends, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : ibm, integrated threat management, threat mitigation, threat management, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management
     IBM
By: IBM     Published Date: Apr 04, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : ibm, fraud loss reduction, fraud management, fraud prevention, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : ibm, fraud protection, fraud management fraud prevention, security, knowledge management, enterprise applications
     IBM
By: SAP     Published Date: Mar 22, 2016
This white paper offers a deeper perspective on digital transformation in our industry. Focusing on how companies in the high tech industry can stay competitive and in turn pioneer new growth and innovation across all industries in this new digital world.
Tags : digital economy, sap, high-tech growth, it management, knowledge management, enterprise applications
     SAP
By: Telx     Published Date: Mar 22, 2016
For many midsize companies, the Cloud may not seem error-proof due to a growing list of challenges—technical, financial, and personnel. So, how can IT pros today deliver on the value of Cloud services and applications, while mitigating these resource constraints?
Tags : cloud, services, applications, it management, knowledge management, business technology
     Telx
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com