IBM
Displaying 1-40 of 4322 results
-
Strategic Server Refresh with IBM System x
This analyst paper by Edison Group addresses the strategic reasons why organizations need to refresh their servers, and how a server refresh with IBM System x® servers, powered by the latest Intel® Xe...
Sponsored By IBM
-
IBM SmartCloud Desktop Infrastructure Reference Architecture: Citrix VDI-in-a-Box powered by IBM System x
With the explosion of mobile devices and an increasingly mobile society, employees expect the workplace to come with them wherever they go and on whatever device they use. While this mindset of anytim...
Sponsored By IBM
-
Windows Storage Server 2012 on System x
With the introduction of the Microsoft® Windows® Storage Server 2012 offering via the IBM® Reseller Option Kit (ROK) program, clients can now get customized unified storage solutions which precisely m...
Sponsored By IBM
-
IBM SmartCloud Desktop Infrastructure
Today, employees expect the workplace to come with them wherever they go and on whatever device they use. This anytime, anywhere “bring-your-own-device” (BYOD) mindset poses a dilemma for organization...
Sponsored By IBM
-
IBM Lets You Have It Your Way - Enhanced Storwize V3700
Today´s small and midsized data centers need to provide the same seamless delivery of IT services as the ones of major enterprises. With Storwize® V3700, IBM® has tailored one system specifically to a...
Sponsored By IBM
-
Storage: Economics Remains Crucial
IT managers and industry experts talk a lot about performance and capacity, but those are often only replacement terms for the real issue: economics. Storage decisions are only necessary because of ec...
Sponsored By IBM
-
Creating the Ultimate Security Platform
It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every d...
Sponsored By IBM
-
Identity and Access Management Buyer's Guide
This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address th...
Sponsored By IBM
-
2013 Gartner Magic Quadrant for SIEM
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirement...
Sponsored By IBM
-
2013 Gartner Critical Capabilities for SIEM
IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilit...
Sponsored By IBM
-
IDC: The Business Value of IBM zEnterprise System Deployments
This white paper by IT industry analyst firm IDC highlights the business value of consolidating workloads on IBM System z and Linux, based on a variety of customer deployments.
Sponsored By IBM
-
Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
A new research study, based on real world production data from 79,360 customer sites, “Comparing Virtualization Alternatives – What’s best for your business ?” is now available. The paper reviews quan...
Sponsored By IBM
-
Private Clouds Will Use Hybrid Infrastructure- The Role Of Mainframes In Cloud: To Meet The Full Range Of Reliability And Security Needs
This paper looks at the requirements of the next generation of applications moving to the cloud. The paper discusses cloud customers' desire for a greater infrastructure choice and openness to hybrid ...
Sponsored By IBM
-
IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps
With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integra...
Sponsored By IBM
-
A college board case study: quality software is secure software.
Plain and simply, you cannot have quality software that is insecure. The question is, with tight budgets and timelines, how can you bring software security to the forefront and raise the assurance lev...
Sponsored By IBM
-
Gartner 2013 Magic Quadrant for Application Security Testing
Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Lead...
Sponsored By IBM
-
Meeting the mobile challenge with IBM System z
IBM Software for System z delivers the security, systems connectivity, and development capabilities to meet tough enterprise mobile requirements. Mobile is huge. The use of mobile devices and apps i...
Sponsored By IBM
-
Enterprise Systems 2013
Get the skills you need for today's transforming technology at IBM Enterprise Systems2013. Register now at www.ibm.com/enterprise.
Sponsored By IBM
-
IBM: An Early Leader across the Big Data Security Analytics
This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions ...
Sponsored By IBM
-
Equifax
As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores...
Sponsored By IBM
-
IBM Security Intrusion Preventions Solutions
As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, p...
Sponsored By IBM
-
Beyond the Next Generation: Putting Advanced Network Security To Work
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabili...
Sponsored By IBM
-
2012 IBM X-Force Annual Trend and Risk Report
The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet ...
Sponsored By IBM
-
Customer Analytics: A Powerful Source of Competitive Advantage for Midsize Organizations
Organizations that adopt customer analytics can provide a higher level of service and build strong customer relationships. Learn how in this newsletter, featuring new research from Gartner. Top 3 tak...
Sponsored By IBM
-
Using Services to Support a New Generation of ERP in the Midmarket
Top organizations are looking for a new generation of ERP that supports multi-tiered businesses, is easy to use, flexible, and powerful enough to support a growing organization. Aligning these solutio...
Sponsored By IBM
-
Integrated ERP Guide: Expert answers to your most frequently asked questions
For leaders of midsize companies, knowing how to design, improve and implement Enterprise Resource Planning (ERP) across the organization can be a daunting challenge. For the first time in this intera...
Sponsored By IBM
-
Enterprise Resource Planning Systems drive cost reduction and efficiency in Finance and Accounting Operations
An analysis of data from 1,200 benchmarking study participants quantifies the benefits an organization can gain through the use of enterprise resource planning systems (ERPs). Benchmarking data shows ...
Sponsored By IBM
-
10 Ways to Build Better CRM Processes
Most businesses see the value in CRM and ERP. When implemented properly, these platforms can enable better sales, more efficient marketing, and drive both top line and bottom line revenue growth. Gett...
Sponsored By IBM
-
Gaining and Executing a Smarter Understanding of Customers
This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM col...
Sponsored By IBM
-
Analytics: The real-world use of big data - How innovative enterprises in the midmarket extract value from uncertain data
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to driv...
Sponsored By IBM
-
Go from analysis to action on your desktop: IBM Cognos Insight guides business analysts to faster, better outcomes -
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inab...
Sponsored By IBM
-
Mid - Market Analytics in North America: Transforming Data into Insight
For midsize organizations, business analytics offers the crucial ability to transform data into insight and uncover opportunities for growth and competitive advantage. This Aberdeen Sector Insight exp...
Sponsored By IBM
-
How to Start Your Big Data Journey
Big data is not just about technology. It's about the value you can extract and the problems you can solve with the technology. While each industry has its own unique challenges, IBM has identified fi...
Sponsored By IBM
-
IBM x86 Servers in the Cloud: Serving the Cloud
An analysis and perspective from leading IT Industry analysts Technology Business Research (TBR) on how x86 servers and the implementation of private clouds offer a secure and cost-effective means for...
Sponsored By IBM
-
Business-Class Servers for a PC Budget
Edison Group interviewed a number of business owners running office or franchise workloads and consultants/resellers who cater to them, to assess the server-related challenges faced by these organizat...
Sponsored By IBM
-
Cloud for Dummies, IBM Midsize Company Limited Edition
This book gives mid-sized companies insights on what it means to create flexible pools of computing resources that break down silos in your company so you can perform in a smarter and more proactive m...
Sponsored By IBM
-
IBM System x M4 Servers Deliver Compelling Performance and Energy Efficiency
The M4 generation of IBM® System x® servers, featuring Intel® E5-2600 processors, brings compelling benefits to datacenters, even where existing servers are a just few generations old. Processor techn...
Sponsored By IBM
-
System x Selection Tool
Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this s...
Sponsored By IBM
-
TBR Corporate IT Buying Behavior & Customer Satisfaction Study
Leading IT industry analysts Technology Business Research (TBR) conducts quarterly x86 Server Customer Satisfaction (CSAT) studies to identify what factors are most important to small and midsize comp...
Sponsored By IBM
-
Deploying Cloud with IBM System x
As a small or medium-sized business, knowing which infrastructure investments you need to make to improve your business is easy. The struggle is being able to apply your finite resources for long-term...
Sponsored By IBM
-
Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
In this IBM® Redpaper™ document we discuss how Tivoli® Security Management for z/OS® allows you to submit mainframe security information from z/OS, RACF®, and DB2® into an...
Sponsored By IBM
-
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy ...
Sponsored By IBM
-
Get actionable insight with security intelligence for mainframe environments
In today’s interconnected business environment, no system is immune to threats, including mainframe environments. To help manage this challenge IBM delivers integrated threat analysis, real-time ale...
Sponsored By IBM
-
IBM zSecure Compliance and Administration
IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified secur...
Sponsored By IBM
-
Keeping distributed endpoints safe and secure
In today’s far-reaching environments, where the numbers and varieties of servers, desktops, laptops, mobile devices and specialized equipment such as point-of-sale (POS) devices, ATMs and self-service...
Sponsored By IBM
-
Introducing IBM's Advanced Threat Protection Platform: IBM's Extensible Approach to Threat Prevention
Organizations face consistent attacks from outside the organization as well as inside their organization. They must defend a dynamic ecosystem of applications and computer systems from targeted dynami...
Sponsored By IBM
-
IPS: Evolving to Remain Relevant
With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker ...
Sponsored By IBM
-
Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation
IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.
Sponsored By IBM
-
Beyond the Next Generation: Meeting the Converging Demands of Network Security
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way...
Sponsored By IBM
-
Five steps to achieve success in your application security program
This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your s...
Sponsored By IBM
-
Managing Access Security in a Multi-Perimeter World
Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new i...
Sponsored By IBM
-
Increase productivity and security with identity and access management
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resource...
Sponsored By IBM
-
Managing identities and access in the cloud
The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cl...
Sponsored By IBM
-
Consolidated security management for mainframe clouds
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centraliz...
Sponsored By IBM
-
Identity and Access Intelligence: Transforming Enterprise Security
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security ev...
Sponsored By IBM
-
Glassbox testing. Thinking inside the box
Automated tools for assessing the security of web applications fall into two main categories: Black box and white box testing. Each has its benefits and challenges, and many organizations use both to ...
Sponsored By IBM
-
Application security and risk management
To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor ...
Sponsored By IBM
-
Integrating Security into Development, No Pain Required
In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application fu...
Sponsored By IBM
-
How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security Profiles
Web-based systems can compromise the overall security of an organization by introducing vulnerabilities that hackers can use to gain access to confidential company information. In addition, the growth...
Sponsored By IBM
-
Ensuring application security in mobile environments
As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, ...
Sponsored By IBM
-
Safeguarding the cloud with IBM Security solutions
Maintain visibility and control with proven security solutions for public, private and hybrid clouds
Sponsored By IBM
-
IBM's Approach to Advanced Persistent Threats
In this video Brendan Hannigan, GM IBM Security Systems, talks about how the threat landscape is intensifying and what IBM is doing to address this challenge.
Sponsored By IBM
-
Avoiding insider threats to enterprise security
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring a...
Sponsored By IBM
-
Intelligent role management for improved security and compliance
In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role...
Sponsored By IBM
-
IBM Identity and Access Management
This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data a...
Sponsored By IBM
-
Secure By Design: Building Identity-based Security into Today’s Information Systems
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the ...
Sponsored By IBM
-
Mitigating Insider Threats
IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automate...
Sponsored By IBM
-
Secure Web Applications: Creating a Security Culture
Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless...
Sponsored By IBM
-
The new frontier. Securing mobile apps
Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of de...
Sponsored By IBM
-
Ensuring application security in mobile device environments
In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the ...
Sponsored By IBM
-
How web application vulnerability assessment tools can improve enterprise security
This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.
Sponsored By IBM
-
The College Board: creating security and cost savings early in the development cycle
Sean Poris, College Board's Senior Director of Software Security discusses crucial security touchpoints in the software development lifecycle that are helping to lower risk and raise the security post...
Sponsored By IBM
-
Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications an...
Sponsored By IBM
-
Customer Analytics: A Powerful Source of Competitive Advantage for Midsize Organizations
Organizations that adopt customer analytics can provide a higher level of service and build strong customer relationships. Learn how in this newsletter, featuring new research from Gartner. Top 3 tak...
Sponsored By IBM
-
Equifax
As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores...
Sponsored By IBM
-
The role big data plays in solving complex security challenges
To aid in the detection of stealthy threats that can hide in the increasing mounds of data, IBM announced IBM Security Intelligence with Big Data, combining leading security intelligence with big data...
Sponsored By IBM
-
Stay Ahead of Insider Threats with Predictive, Intelligent Security
It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combinat...
Sponsored By IBM
-
Extending Security Intelligence with Big Data
Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere BigInsights technologies helping organizations address the most vexing security challenges, ...
Sponsored By IBM
-
IT Executive Guide to Security Intelligence
This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agenci...
Sponsored By IBM
-
IBM Security Priviledged Identity Management
IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities. This Flash Demo shows how IBM Secur...
Sponsored By IBM