IBM

Displaying 1-40 of 3692 results

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Sep 2014

    Improve Collaboration By Adding Social Capabilities to Email

    The IDC Technology Spotlight Whitepaper examines how Email is the key mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. However, as relationships across all business communication channels continue...

    Sponsored By IBM

  • White Papers // Sep 2014

    Evolving Toward The Next Phase Of Email

    Osterman Research conducted a survey during March 2014 with 294 information workers to determine how they employ email, how they manage various information-focused work processes, and the changes they would like to see in these processes. Results show, a typical user spends two hours per day working in the corporate...

    Sponsored By IBM

  • White Papers // Sep 2014

    Ovum Report New Versions Of IBM Notes And Domino Show Microsoft The Way Forward

    Ovum's assessments of IBM's collaboration portfolio over the last four years have put IBM ahead of the field in terms of technical capability,and the company’s enterprise social networking software has led the way in terms of estimated revenue for the last three years. Read how Ovum believes this momentum will...

    Sponsored By IBM

  • White Papers // Oct 2014

    Virtualizing DR using Cloud : Protect your Applications Quickly With a Resilient Cloud

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Putting Mobile First - Best Practices for IT Leaders

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • Case Studies // Oct 2014

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • White Papers // Oct 2014

    Unlocking value in the “bring your own device” era - Flexible Workplace

    Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains...

    Sponsored By IBM

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Sponsored By IBM

  • White Papers // Sep 2014

    Transforming your voice, video and collaboration - Unified communications for mobile and social collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • Case Studies // Oct 2014

    Pervasive Technology Trends: Implications for your Data Center

    Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy...

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study- Australia

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in Australia.

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study Sponsored by IBM - Global Analysis

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations.It answers critical questions such as: How much can a data breach cost? And are you doing enough to prevent it from happening to you?

    Sponsored By IBM

  • White Papers // Apr 2014

    Uniform Server Management for Hybrid Environments

    With a broad array of multivendor, cloud and non-cloud platforms and devices to support, managing today’s server infrastructures has grown increasingly complicated. Check this out and learn how you can manage server infrastructures efficiently.

    Sponsored By IBM

  • White Papers // Oct 2014

    Getting The Most From Your Hybrid IT Environment

    This infographic highlights the ways experienced sourcing providers can help organizations profit from hybrid IT by enabling new ways of doing business and reducing costs. Read More...

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

    Sponsored By IBM

  • Live Event // Oct 2014

    Join fellow Development Managers, Developers and Technologists at IBM DeveloperConnect 2014

    Join fellow Development Managers, Developers, Programmers, Testers, Assemblers, Engineers and Architects at the UK’s premier event for software and systems developers IBM DeveloperConnect 2014. Learn how the latest in Cloud, Big Data and Analytics, Mobile, Social and Security can help you develop faster - and smarter. You’ll have the...

    Sponsored By IBM

  • White Papers // Oct 2014

    The Individual Enterprise - How Mobility Redefines Business

    The mobility revolution is impacting every aspect of our lives, both personal and professional. But many businesses are seriously underestimating the full impact of this burgeoning transformation. Read the white paper “The Individual Enterprise” to find out why IBM believes that the time has come for organizations of all sizes,...

    Sponsored By IBM

  • White Papers // Jan 2014

    The “Upwardly Mobile” Enterprise

    Senior managers from hundreds of enterprises around the globe, in multiple industries, with a range of titles, were asked about their mobile strategies and current level of success.

    Sponsored By IBM

  • White Papers // Oct 2014

    Are You Getting The Most From Your Hybrid IT Environment?

    This infographic highlights the ways experienced sourcing providers can help organizations profit from hybrid IT by enabling new ways of doing business and reducing costs. Read More..

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Cost of Data Breach Study: Impact of Business Continuity Management

    Read the analyst report to learn how having a BCM program can impact the probability of having a breach, affect the continuity of business operations and influence an organization’s reputational losses, as well as the four critical factors that can help reduce the per capita cost of a data breach....

    Sponsored By IBM

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • Webcasts // Oct 2014

    Gaining The Upper Hand In Today's Cyber Security Battle

    Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be offering the insight necessary to develop a proactive stance and thwart attackers. Read More..

    Sponsored By IBM

  • White Papers // Nov 2014

    Bare Metal Cloud- A Non-Virtualized Cloud Option for Performance-Sensitive Workloads

    This provides the results of a buyer/demand-side survey of U.S. enterprises with 1,000+ employees, involving more than 400 respondents, on their perceptions of the preferred business models & service providers–outsourcers from which they would want to procure private or public cloud & IaaS

    Sponsored By IBM

  • White Papers // Nov 2014

    Stepping Into the Cloud- A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with a focus on the IBM Cloud portfolio offered by IBM and its partners.

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your ERP Workload

    This report explores that ERP workloads are too important and complex to risk in a commodity cloud service but too costly and labor-intense to be left out of the cloud strategy suggesting they are best served in a flexible hybrid cloud environ, designed for ERP software, managed by experts

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your DevOps Workload

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Nov 2014

    Leveraging the Cloud for your Big Data Workload

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // Nov 2014

    Best Practice Security in a Cloud Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // Nov 2014

    Redefining networks for cloud, analytics, mobile, social and security - New technologies are pushing networks to the breaking point

    Much has been written about cloud, big data, mobile, social, and IT security as significant forces that are transforming information technology and business. Much less has been said about the impact of these forces on networking—or about the role that networks play when business initiatives are based on them. Download...

    Sponsored By IBM

  • White Papers // Nov 2014

    Networking for a Smarter Data Centre: Getting it right

    This paper explores how a holistic management approach to networks, servers, storage and applications can aid in the evolution to a smarter data centre and drive optimal value for the organisation. Download this whitepaper now and learn how your organisation can leverage virtualisation for deploying services efficiently and responding to...

    Sponsored By IBM

  • White Papers // Nov 2014

    IDC Report - Business Value of Managed Services

    Research shows that today's business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this IDC analyst...

    Sponsored By IBM

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

    Sponsored By IBM

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Aug 2014

    Buyer's Guide: Identity and Access Management

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM