IBM

Displaying 1-40 of 3751 results

  • White Papers // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • Webcasts // Mar 2015

    On-demand Webcast: Digital Engineering for the Oil and Gas Industry

    As the industry advances in its exploration for new stocks of crude and gas, we are seeing new complexities that impact engineering designs and also create a demand for designs that contribute to improved operations at greater depths. This webcast will illustrate how a multi-vendor, globally distributed engineering project utilized...

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • White Papers // Feb 2015

    Winning the War on Cybercrime: The Four Keys to Holistic Fraud Prevention

    Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows...

    Sponsored By IBM

  • White Papers // Feb 2015

    The Thriving Malware Industry: Cybercrime Made Easy

    The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can...

    Sponsored By IBM

  • White Papers // Feb 2015

    Old Techniques, New Channel: Mobile Malware Adapting PC Threat Techniques

    With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC. Read this white paper to learn more about the emerging attack techniques...

    Sponsored By IBM

  • White Papers // Jan 2015

    Four Key Trends Impacting Mobile Infrastructure - Review

    As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst...

    Sponsored By IBM

  • White Papers // Jan 2015

    Gartner Report: Magic Quadrant for Managed Mobility Services

    Of the 14 top managed mobility services providers Gartner examined and reviewed by both completeness of vision and ability to execute, only IBM was positioned in the Leaders Quadrant in their latest Magic Quadrant report. Read the analyst report to learn more. We continue to address the growing needs of...

    Sponsored By IBM

  • White Papers // Jun 2014

    Integrated, Secure and Productive: Building the Mobile Enterprise

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • White Papers // Jan 2015

    Putting Mobile First: Best Practices of Mobile Technology Leaders - Japanese

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • White Papers // Jan 2015

    IT Mobile Worksyle Innovation - Japanese

    Download this resource and learn how the Mobile IT environment have change in the last years.

    Sponsored By IBM

  • Live Event // Mar 2015

    IBM MobileFirst Roundtable: Creating Exceptional Mobile Experiences - Invitation

    A good app can increase traffic, sales, employee productivity and brand satisfaction. A good mobile app strategy including right design, development, integration, and management, enables businesses to maintain their competitiveness and reduce costs. A bad App strategy will do the opposite. Join us at this complimentary roundtable and take control...

    Sponsored By IBM

  • White Papers // Mar 2015

    Good Apps, Bad Apps - The Cost Of Creating Exceptional Mobile Moments Through Mobile Apps

    In August 2014, IBM commissioned Forrester Consulting to examine the impact of “good” or “bad” mobile applications on a company’s brand, revenue, and cost structure through primary research and the creation of a cost framework and model. Forrester performed three studies to identify the characteristics of good and bad mobile...

    Sponsored By IBM

  • Videos // Apr 2015

    Building an Enterprise Linux Solution: SUSE & Power Systems

    With SUSE Linux Enterprise Server on IBM Power Systems, you gain the next generation of enterprise Linux operating system and IBM hardware, optimized for superior reliability and performance and the flexibility to run the most demanding business critical workloads. Download this on demand webinar and learn about the next enterprise...

    Sponsored By IBM

  • White Papers // Apr 2015

    Ten Answers Regarding Mobile App Testing

    This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test...

    Sponsored By IBM

  • White Papers // Apr 2015

    Service Virtualization For Dummies

    Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes...

    Sponsored By IBM

  • Webcasts // Apr 2015

    Real Experiences: Transforming Application Delivery for Continuous Innovation

    Key Takeaways: Learn from real experiences in transforming large organizations for increased speed and quality using a DevOps approach. Explore the characteristics and behavior of fast-moving companies, based on hundreds of assessments, interviews and implementations. Begin a self-assessment designed to give you a better understanding of your organization's readiness and...

    Sponsored By IBM

  • eBooks // Apr 2015

    Agile for Dummies

    Confused by all the agile advice? Relax! With Agile For Dummies by your side you'll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.

    Sponsored By IBM

  • White Papers // Apr 2015

    Four Steps to a Proactive Big Data security and Privacy Strategy: Elevate Data Security to the Boardroom Agenda

    This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.

    Sponsored By IBM

  • White Papers // Apr 2015

    Implement A Proactive Strategy For Data Security: Data Security And Privacy Are Critical Business Imperatives In The Data Economy

    Hardly a week goes by without headlines about a breach of customer data. Less frequent, but just as alarming, are the publically reported examples and allegations of intellectual property theft. Data security and privacy - and by extension, brand reputation - is front and center today, and will quickly become...

    Sponsored By IBM

  • White Papers // Apr 2015

    IDC MarketScape evaluates Global Managed Security Services providers

    IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based...

    Sponsored By IBM

  • White Papers // Apr 2015

    Cost of a Data Breach Calculator

    This survey examines the costs incurred by organizations after experiencing genuine data loss incidents

    Sponsored By IBM

  • White Papers // Apr 2015

    SOC Optimization Whitepaper

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).

    Sponsored By IBM

  • White Papers // Apr 2015

    2014 Gartner Group Magic Quadrant on Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.

    Sponsored By IBM

  • White Papers // Apr 2015

    eBook: Data Security Strategies for Next Generation Data Warehouses

    Organizations are increasingly relying on data warehouses to provide the business critical reporting and analysis needed to empower business decisions and drive results. Data warehouses store current, as well as historical data, to satisfy business queries of all kinds. However, as the number of data warehouses storing sensitive data increases,...

    Sponsored By IBM

  • White Papers // Apr 2015

    Best Practices for Securing Hadoop - Gartner Report

    "Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. Most enterprise big data projects were initially ""grassroots"" efforts with no involvement from enterprise information security departments, inadvertently exposing sensitive data. To protect sensitive data being stored...

    Sponsored By IBM

  • White Papers // Apr 2015

    The Future of Data Security: A Zero Trust Approach, A Forrester Report

    "As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s...

    Sponsored By IBM

  • White Papers // Apr 2015

    Gartner Best Practices for Securing Hadoop

    Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.

    Sponsored By IBM

  • White Papers // Mar 2014

    Three guiding principles for data security and compliance

    The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult...

    Sponsored By IBM

  • White Papers // Apr 2015

    Magic Quadrant for Data Masking Technology, Gartner Research

    IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. IBM received the highest positioning in the ability to execute and completeness of vision categories. Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training....

    Sponsored By IBM

  • White Papers // Apr 2015

    Bridging the Data Security Gap - Unified Data Protection for Four Key Data Environments

    Today's IT environment is complex - big data, cloud and virtual, enterprise data, and enterprise application security. How do you protect them all? Read this e-book and learn how you can implement an effective data security and privacy solution for multiple environments.

    Sponsored By IBM

  • eBooks // Mar 2014

    Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.

    A policy-driven, on-demand masking approach enables organizations to proactively protect data privacy and support compliance. This approach is especially important in the current era of computing, where data is everywhere and is continuously growing in volume, variety and velocity.

    Sponsored By IBM

  • White Papers // Feb 2015

    Forrester report: Secure the Enterprise with Confidence

    This Forrester Consulting thought leadership paper, commissioned by IBM, examines the infrastructure landscape for security to help detect threats and protect the reputation of an enterprise.

    Sponsored By IBM

  • eBooks // Mar 2014

    Planning a data security and auditing deployment for Hadoop

    As the most widely adopted big data technology, Hadoop delivers insights for many organizations. However, the security risks remain high. Considering that even robust and mature enterprise relational database systems are often the target of attacks, the relative lack of controls around Hadoop makes it an attractive target, especially as...

    Sponsored By IBM

  • White Papers // Apr 2015

    Security Essentials for CIO's: Establishing a Department of Yes

    Security Essentials for CIOs: Establishing a "Department of Yes". IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. Learn more in this whitepaper.

    Sponsored By IBM

  • White Papers // Apr 2015

    Security Essentials for CIO's: Responding to Inevitable Incident

    IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.

    Sponsored By IBM