IBM

Displaying 361-400 of 3692 results

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM: An Early Leader across the Big Data Security Analytics

    This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // May 2013

    Develop an Intelligent Disaster Recovery Solution With Cloud Technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • White Papers // Apr 2013

    Increase Productivity and Security with Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing Solution for Financial Markets

    This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all...

    Sponsored By IBM

  • White Papers // Apr 2013

    The State of Next-Generation Market- and Credit-Risk Analytics

    In order to ensure that the devastation of The Great Recession never repeats itself, organizations are leveraging more intelligent risk management solutions. However, reaching a state of risk management Nirvana is complicated and requires a comprehensive understanding of the optimal technologies and strategies at your fingertips. In this report,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing Identities and Access in the Cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Feb 2013

    Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Avoiding Insider Threats to Enterprise Security

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Feb 2013

    Get Actionable Insight with Security Intelligence for Mainframe Environments

    In today’s interconnected business environment, no system is immune to threats, including mainframe environments. To help manage this challenge IBM delivers integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help you keep pace with today’s increasing threats with a single view into the risks affecting both...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to...

    Sponsored By IBM

  • White Papers // Feb 2013

    Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink their defense against a wide range of threats, cope with mobile and cloud security...

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Virtualizing Disaster Recovery Using Cloud Computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • Research // Feb 2013

    Source Business Technology Resiliency Capabilities

    Most business continuity management teams today are understaffed, consisting of just a few dedicated corporate resources and regional or business unit representatives. Sound familiar? If so, outsourcing your organization’s business resiliency planning, strategy and program design can be a cost-effective, efficient option. In a study of global business continuity vendors,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Stepping Into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    The benefits promised by cloud computing are excellent, but when faced with conflicting reports of risks and benefits, many companies struggle to take this good idea to a practical reality. This white paper offers steps for moving a business into the cloud, with a focus on the SmartCloud Services portfolio...

    Sponsored By IBM

  • White Papers // Mar 2012

    Build a hybrid cloud: Choose a cloud partner

    This paper will provide you with a list of steps and considerations that you can use as the basis for your own plan in working with a Cloud Service Provider.

    Sponsored By IBM

  • White Papers // Jun 2011

    The Evolution of Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • White Papers // Jan 2015

    Embracing Analytics as a Competitive Strategy for a Midmarket Organization

    This white paper will discuss the challenges most companies face with managing their data and suggest some strategies and solutions to turn midmarket data into a working asset.

    Provided By IBM

  • White Papers // Jan 2015

    The Business Value of IBM's Exceptional Digital Experience Solutions

    Today’s customers have more opportunities than ever to connect with a brand, and often research products and make purchases through a variety of different channels. However, it’s important to remember that employees are also customers in their personal lives, meaning that they also have high expectations for digital experiences in...

    Provided By IBM

  • White Papers // Jan 2015

    Disclosure management for budgeting, planning and forecasting: The next frontier?

    In the IBM white paper “Disclosure management for budgeting, planning and forecasting: The next frontier?”, Gary Simon, managing editor of the Financial Systems News, discusses how disclosure management technology can move beyond its traditional use in financial reporting to also benefit budgeting, planning and forecasting functions.

    Provided By IBM

  • White Papers // Jan 2015

    A Smarter Approach: Inside IBM Business Analytics Solutions for Mid-Size Businesses

    IBM is at the forefront of bringing big data to midsize businesses. With business analytics software solutions that are robust, easy to use, and accessible to all users across an organization, you place the right tools in the hands of users who need it the most. Learn how IBM can...

    Provided By IBM

  • White Papers // Jan 2015

    IBM Cognos Express - Breakthrough business intelligence and performance management for workgroups and midsize organizations

    IBM Cognos Express provides integrated BI and planning for midsize businesses.

    Provided By IBM

  • White Papers // Jan 2015

    Cognos Disclosure Management for the Midmarket

    Learn how Cognos Disclosure Management helps midmarket companies automate the creation of performance reports and regulatory filings in a secure, collaborative environment.

    Provided By IBM

  • White Papers // Jan 2015

    Strategic IT Survey Results: Big Data

    Ziff Davis asked its diverse audience of IT professionals and decision makers to provide their insights on these questions and help us get a better picture of the state of analytics among real companies. Ziff Davis conducted a broad, big data analytics survey, asking readers questions relating to the current...

    Provided By IBM

  • White Papers // Jan 2015

    Turning Big Data into Business INSIGHTS

    Ziff Davis recently surveyed over 300 IT professionals on the state of big data and analytics initiatives in their organizations. The results tell a compelling story: while most IT pros understand the value of big data, actually operationalizing their analytics strategies to deliver usable insights to their organizations remains a...

    Provided By IBM

  • White Papers // Jan 2015

    Planning For Big Data, Preparing For Business Analytics

    Ziff Davis recently surveyed 302 IT professionals to gain insight into their big data and analytics strategies. The survey revealed that many organizations were struggling to move from planning phases to execution and suggested a number of possible pain points around big data initiatives.

    Provided By IBM

  • White Papers // Nov 2014

    Build a hybrid cloud: Create A Strategy

    This paper provides context and guidance on how to create a proactive, effective approach to cloud computing and will address these important questions in the process. How do we prepare for the arrival of cloud computing? What considerations should a cloud computing strategy address? How do we utilize cloud to...

    Provided By IBM

  • White Papers // Nov 2014

    Build a hybrid cloud: Define your ecosystem

    Moving to a cloud environment is no longer just an information technology IT strategy it’s a business decision as well. Cloud is motivating business and IT to emerge from their respective silos. This paper discusses how to convert cloud’s considerable benefits into business opportunities with an astute understanding of your...

    Provided By IBM

  • White Papers // Nov 2014

    Build a hybrid cloud: Create A Strategy

    This paper provides context and guidance on how to create a proactive, effective approach to cloud computing and will address these important questions in the process. How do we prepare for the arrival of cloud computing? What considerations should a cloud computing strategy address? How do we utilize cloud to...

    Provided By IBM

  • White Papers // Nov 2014

    The Impact of Credit Value Adjustment (CVA)

    In response to regulations, banks are adopting more rigorous stress tests and risk exposure calculations. Societe Generale and IBM highlight the importance of CVA (Part 2 of 3)

    Provided By IBM

  • Webcasts // Nov 2014

    Eliminating the NFS Hotspot Bottleneck - Webcast

    In this presentation, we will discuss filer bottleneck problems common to manufacturing design environments and provide a solution that will streamline data access, improve storage management and data availability, and lower operational costs. • Are filer hotspots an issue in your environment? • Do filers ever get unstable due to...

    Provided By IBM