IBM

Displaying 1-40 of 3686 results

  • White Papers // May 2015

    Aberdeen report: Rapid Insight With Results: Harnessing Analytics in the Cloud

    Today's data-driven organization is faced with magnified urgency around data volume, user needs and compressed decision time frames. In order to address these challenges while maintaining an effective analytical culture, many organizations are exploring cloud-based environments coupled with powerful business intelligence (BI) and analytical technology to accelerate decisions and enhance...

    Sponsored By IBM

  • Webcasts // Jun 2015

    Webcast: Advanced Analytics at Scale with IBM: Because Business Outcomes Matter

    Wednesday, June 17, 2015 1:00 PM EDT / 10:00 PM PDT Duration: 30-Minutes As the volume, variety and velocity of information increases, a larger burden is placed on organizations to distribute the right information, at the right time, to the people, processes and applications that rely on it to...

    Sponsored By IBM

  • White Papers // Jun 2015

    Enterprise Mobility Management Big Bang Theory

    Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work. Read More..

    Sponsored By IBM

  • Webcasts // Jun 2015

    IBM Webcast : Advanced Analytics at Scale

    Wednesday, June 17, 2015 1:00 PM EDT / 10:00 PM PDT Duration: 30-Minutes As the volume, variety and velocity of information increases, a larger burden is placed on organizations to distribute the right information, at the right time, to the people, processes and applications that rely on it to...

    Sponsored By IBM

  • White Papers // Dec 2014

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Sponsored By IBM

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Sponsored By IBM

  • White Papers // Dec 2014

    Maximizing Your Opportunity by Extending The IBM System Z Environment To Support Mobility

    This IDC Reports looks at how System Z, IBM’s mainframe environment, is used by enterprises to handle large volumes of critical data in a highly secure, available environment. Today, many of the applications and services on these environments are backoffice environments with green-screen interfaces, but as mobile becomes an increasingly...

    Sponsored By IBM

  • White Papers // Mar 2015

    Good Apps, Bad Apps - The Cost Of Creating Exceptional Mobile Moments Through Mobile Apps

    In August 2014, IBM commissioned Forrester Consulting to examine the impact of “good” or “bad” mobile applications on a company’s brand, revenue, and cost structure through primary research and the creation of a cost framework and model. Forrester performed three studies to identify the characteristics of good and bad mobile...

    Sponsored By IBM

  • Live Event // Mar 2015

    IBM MobileFirst Roundtable: Creating Exceptional Mobile Experiences - Invitation

    A good app can increase traffic, sales, employee productivity and brand satisfaction. A good mobile app strategy including right design, development, integration, and management, enables businesses to maintain their competitiveness and reduce costs. A bad App strategy will do the opposite. Join us at this complimentary roundtable and take control...

    Sponsored By IBM

  • Webcasts // Jun 2015

    Free Webcast : Advanced Analytics at Scale with IBM: Because Business Outcomes Matter

    Wednesday, June 17, 2015 1:00 PM EDT / 10:00 PM PDT Duration: 30-Minutes As the volume, variety and velocity of information increases, a larger burden is placed on organizations to distribute the right information, at the right time, to the people, processes and applications that rely on it to...

    Sponsored By IBM

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // May 2015

    Leveraging The Cloud For Your Big Data Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // May 2015

    Leveraging The Cloud For Your DevOps Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Mar 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Sponsored By IBM

  • White Papers // May 2015

    Real-time Geospatial Analytics and the Connected Car

    The availability of real-time location data from vehicles, phones, and almost anything else that is not nailed down, opens up endless possibilities for creating value--provided that you have the infrastructure to collect and keep up with all that data and the analytical smarts to make sense of it. From emergency...

    Sponsored By IBM

  • Webcasts // Jan 2015

    Harnessing Data in the Internet of Things Webcast

    This prerecorded webinar features Mr. Gary Barnett of Ovum research as he discusses the data management challenges that organizations face in their attempts to conquer Big Data and the need for an enterprise-scale database management platform that is designed to anticipate and bridge the gap between edge-connected devices and machines...

    Sponsored By IBM

  • White Papers // May 2015

    Unleash the Power of Internet of Things

    IBM and Intel gateway solutions bring real-time intelligence to the Internet of Things. Finally, your business can reliably store, access and analyze data from billions of connected devices on the edge - and answer the toughest questions, faster than ever.

    Sponsored By IBM

  • White Papers // May 2015

    Harnessing Data in the Internet of Things Analyst Report

    This report examines the potential that the IoT offers in enabling organizations to develop deeper, more fine-grained and timely insight from the massive volume of data that it will generate and the steps that organizations need to take in order to drive new insight from big data.

    Sponsored By IBM

  • White Papers // May 2015

    Internet of things Data: How to use Embedded Database and Streaming Analytics for Value

    The Internet of Things is driven by consumer demand for new services and convenience, as well as by the availability of low cost sensors smart phones, and universal internet access, offering tremendous growth opportunities and new revenue streams. New technologies can enable you to take advantage of this new natural...

    Sponsored By IBM

  • White Papers // Oct 2014

    Is Your Business Ready for the Internet of Things

    Are you ready for the Internet of Things? IBM Informix offers an intelligent, enterprise-class database with key capabilities to address the data management challenges of big data, cloud and mobile computing.

    Sponsored By IBM

  • White Papers // Jun 2015

    Taming IT Complexity with Managed Services

    The need for IT to evolve beyond virtualization and embrace software defined data center models has never been greater. Many organizations are reacting to shifts in business requirements and customer demands by embracing cloud, mobile, social, and analytics technologies. However, incorporating these new models into traditional processes marks a...

    Sponsored By IBM

  • Webcasts // Jun 2015

    On-Demand Webcast: Gain More Value and Actionable Insights from Your Data with Powerful Customer Analytics

    Customers are using mobile devices – and multiple channels – to connect with companies, and many organizations scrambling to keep up. Some are gaining a significant advantage by moving mobile analytics and development to the cloud for both content and peripheral services. That's because cloud-enabled software as a service (SaaS)...

    Sponsored By IBM

  • White Papers // Mar 2014

    Three guiding principles for data security and compliance

    The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult...

    Sponsored By IBM

  • eBooks // Mar 2014

    Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.

    A policy-driven, on-demand masking approach enables organizations to proactively protect data privacy and support compliance. This approach is especially important in the current era of computing, where data is everywhere and is continuously growing in volume, variety and velocity.

    Sponsored By IBM

  • White Papers // Apr 2015

    Four Steps to a Proactive Big Data security and Privacy Strategy: Elevate Data Security to the Boardroom Agenda

    This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.

    Sponsored By IBM

  • White Papers // Apr 2015

    Implement A Proactive Strategy For Data Security: Data Security And Privacy Are Critical Business Imperatives In The Data Economy

    Hardly a week goes by without headlines about a breach of customer data. Less frequent, but just as alarming, are the publically reported examples and allegations of intellectual property theft. Data security and privacy - and by extension, brand reputation - is front and center today, and will quickly become...

    Sponsored By IBM

  • White Papers // Apr 2015

    IDC MarketScape evaluates Global Managed Security Services providers

    IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based...

    Sponsored By IBM

  • White Papers // Apr 2015

    Magic Quadrant for Data Masking Technology, Gartner Research

    IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. IBM received the highest positioning in the ability to execute and completeness of vision categories. Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training....

    Sponsored By IBM

  • White Papers // Apr 2015

    Bridging the Data Security Gap - Unified Data Protection for Four Key Data Environments

    Today's IT environment is complex - big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.

    Sponsored By IBM

  • White Papers // Apr 2015

    eBook: Data Security Strategies for Next Generation Data Warehouses

    Organizations are increasingly relying on data warehouses to provide the business critical reporting and analysis needed to empower business decisions and drive results. Data warehouses store current, as well as historical data, to satisfy business queries of all kinds. However, as the number of data warehouses storing sensitive data increases,...

    Sponsored By IBM

  • White Papers // Apr 2015

    Best Practices for Securing Hadoop - Gartner Report

    "Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. Most enterprise big data projects were initially ""grassroots"" efforts with no involvement from enterprise information security departments, inadvertently exposing sensitive data. To protect sensitive data being stored...

    Sponsored By IBM

  • White Papers // Apr 2015

    The Future of Data Security: A Zero Trust Approach, A Forrester Report

    "As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s...

    Sponsored By IBM

  • White Papers // Apr 2015

    Gartner Best Practices for Securing Hadoop

    Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.

    Sponsored By IBM

  • White Papers // Feb 2015

    Forrester report: Secure the Enterprise with Confidence

    This Forrester Consulting thought leadership paper, commissioned by IBM, examines the infrastructure landscape for security to help detect threats and protect the reputation of an enterprise.

    Sponsored By IBM

  • eBooks // Mar 2014

    Planning a data security and auditing deployment for Hadoop

    As the most widely adopted big data technology, Hadoop delivers insights for many organizations. However, the security risks remain high. Considering that even robust and mature enterprise relational database systems are often the target of attacks, the relative lack of controls around Hadoop makes it an attractive target, especially as...

    Sponsored By IBM

  • White Papers // Dec 2013

    Security Intelligence is the Smart Way to Keep the Cloud Safe

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Feb 2015

    See Clearly in the Cloud with Threat-Aware Identity and Access Management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • White Papers // Feb 2015

    Cloud Requires Dynamic Security

    Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

    Sponsored By IBM

  • White Papers // Feb 2015

    Safeguarding the Cloud with IBM Dynamic Cloud Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Sponsored By IBM