IBM

Displaying 361-400 of 3693 results

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • White Papers // Nov 2013

    Transforming Your Voice, Video and Collaboration Infrastructure - The IBM Journey Toward Unified Communications for Mobile and Social Collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • White Papers // Oct 2013

    Top Ten Criteria for Selecting a Managed Services Provider

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how...

    Sponsored By IBM

  • White Papers // Aug 2013

    Putting Mobile First: Best Practices of Mobile Technology Leaders

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2013

    Intelligent Imaging Leadership Guide

    Download this Leadership Guide to learn the benefits of combining advanced document capture, imaging repositories, workflow and content analytics

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM: An Early Leader across the Big Data Security Analytics

    This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // May 2013

    Develop an Intelligent Disaster Recovery Solution With Cloud Technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • White Papers // Apr 2013

    Increase Productivity and Security with Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Apr 2013

    Algorithmics and IBM Platform Computing Solution for Financial Markets

    This paper describes best practices on how to spread the computational demands of advanced risk analytics across a dynamic grid computing environment. With a more advanced and capable computing infrastructure, banks can move from reactively measuring risk to actively managing risk based on timely insights drawn from rigorous analysis, all...

    Sponsored By IBM

  • White Papers // Apr 2013

    The State of Next-Generation Market- and Credit-Risk Analytics

    In order to ensure that the devastation of The Great Recession never repeats itself, organizations are leveraging more intelligent risk management solutions. However, reaching a state of risk management Nirvana is complicated and requires a comprehensive understanding of the optimal technologies and strategies at your fingertips. In this report,...

    Sponsored By IBM

  • eBooks // Mar 2013

    A Smarter Approach: Inside IBM Business Analytics Solutions for Mid-Size Businesses

    Teams of engineers and statisticians spend their days immersed in seas of data from various sources. However, it isn't just the largest of organizations that can benefit from analytics and data-driven decision-making. Businesses of all sizes need to leverage the new currency of data and information.

    Sponsored By IBM

  • White Papers // Mar 2013

    SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing Identities and Access in the Cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Feb 2013

    Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Avoiding Insider Threats to Enterprise Security

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Feb 2013

    Get Actionable Insight with Security Intelligence for Mainframe Environments

    In today’s interconnected business environment, no system is immune to threats, including mainframe environments. To help manage this challenge IBM delivers integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help you keep pace with today’s increasing threats with a single view into the risks affecting both...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to...

    Sponsored By IBM

  • White Papers // Feb 2013

    Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink their defense against a wide range of threats, cope with mobile and cloud security...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Virtualizing Disaster Recovery Using Cloud Computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • Research // Feb 2013

    Source Business Technology Resiliency Capabilities

    Most business continuity management teams today are understaffed, consisting of just a few dedicated corporate resources and regional or business unit representatives. Sound familiar? If so, outsourcing your organization’s business resiliency planning, strategy and program design can be a cost-effective, efficient option. In a study of global business continuity vendors,...

    Sponsored By IBM

  • White Papers // Jan 2013

    Stepping Into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    The benefits promised by cloud computing are excellent, but when faced with conflicting reports of risks and benefits, many companies struggle to take this good idea to a practical reality. This white paper offers steps for moving a business into the cloud, with a focus on the SmartCloud Services portfolio...

    Sponsored By IBM

  • White Papers // Jun 2011

    The Evolution of Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • White Papers // Nov 2014

    The Impact of Credit Value Adjustment (CVA)

    In response to regulations, banks are adopting more rigorous stress tests and risk exposure calculations. Societe Generale and IBM highlight the importance of CVA (Part 2 of 3)

    Provided By IBM

  • Webcasts // Nov 2014

    Eliminating the NFS Hotspot Bottleneck - Webcast

    In this presentation, we will discuss filer bottleneck problems common to manufacturing design environments and provide a solution that will streamline data access, improve storage management and data availability, and lower operational costs. • Are filer hotspots an issue in your environment? • Do filers ever get unstable due to...

    Provided By IBM

  • White Papers // Nov 2014

    The New Hero of Big Data and Analytics: The Chief Data Officer

    As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.

    Provided By IBM

  • White Papers // Nov 2014

    Analytics Drive Better Marketing at First Tennessee Paper

    Client Reference for analytics

    Provided By IBM