IBM

Displaying 401-440 of 3684 results

  • White Papers // Mar 2013

    Six Trends in Sales Performance Management

    Observations for organizations investigating Sales Performance Management systems.

    Provided By IBM

  • White Papers // Dec 2012

    Barriers in Cryptography with Weak, Correlated and Leaky Sources

    There has been much recent progress in constructing cryptosystems that maintain their security without requiring uniform randomness and perfect secrecy. These schemes are motivated by a diverse set of problems such as providing resilience to side-channel leakage, using weak physical sources of randomness as secret keys, and allowing deterministic encryption...

    Provided By IBM

  • White Papers // Jun 2012

    Fully Anonymous Attribute Tokens from Lattices

    Anonymous authentication schemes such as group signatures and anonymous credentials are important privacy-protecting tools in electronic communications. The only currently known scheme based on assumptions that resist quantum attacks is the group signature scheme by Gordon et al. (ASIACRYPT 2010). The authors present a generalization of group signatures called anonymous...

    Provided By IBM

  • White Papers // Jun 2012

    Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption

    The notion of oblivious transfer with Hidden Access COnTrol policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns...

    Provided By IBM

  • White Papers // May 2012

    Fully Homomorphic Message Authenticators

    The authors define and construct fully homomorphic message authenticators. In such a scheme, anybody can perform arbitrary computations over authenticated data and produce a short tag that authenticates the result of the computation. The user verifies this tag with her private key to ensure that the claimed result is indeed...

    Provided By IBM

  • White Papers // Jun 2012

    Quadratic Span Programs and Succinct NIZKs without PCPs

    The authors introduce a new characterization of the NP complexity class, called Quadratic Span Programs (QSPs), which is a natural extension of span programs defined by Karchmer and Wigderson. Their main motivation is the construction of succinct arguments of NP-statements that are quick to construct and verify. QSPs seem well-suited...

    Provided By IBM

  • White Papers // Jan 2013

    IBM X-Force 2012 Mid-year Trend and Risk Report

    View 2012 security higlights and emerging trends in this 100-page special report published by X-Force, a research and development team dedicated to studying and monitoring the latest threat trends.

    Provided By IBM

  • White Papers // Jan 2013

    Express tape storage solutions from IBM. Solving midsize business backup and archive challenges

    This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions from IBM help companies cost-effectively ensure continuous operations, solve backup and archive problems, and address regulatory compliance.

    Provided By IBM

  • White Papers // Jan 2013

    Express disk storage systems Better manage data growth and complexity with an effective storage strategy

    Explosive data growth and IT complexities are driving the need for greater efficiency across IT organizations. A better disk storage strategy and disk solution from IBM can help midsize businesses manage complexity, increase utilization, simplify operations and more.

    Provided By IBM

  • White Papers // Jan 2013

    The Coming Storage Armageddon: What your Database Administrator Isn’t Telling You March

    The ever-increasing pace of data growth calls for a comprehensive storage strategy that protects data infrastructure from performance problems and is also flexible enough to handle changing business requirements.  Read the advisory brief from Frost & Sullivan's Stratecast group and learn how IBM’s suite of storage solutions addresses big data...

    Provided By IBM

  • White Papers // Jan 2013

    Tape Storage Future Directions and the Data Explosion

    It’s time to bring your views of tape up to date as the future for tape technology has never been brighter. Today’s tape technologies combined with disk technologies in a strategic blended implementation can help users address a myriad of objectives including performance, compliance, security, cost, energy consumption, archive and...

    Provided By IBM

  • White Papers // Jan 2013

    IBM SmartCloud Entry on System x with VMware vSphere Essentials Plus

    To address rapidly changing IT demands, small and midsize businesses (SMBs) can now go beyond virtualization and tap into the economic advantages of private clouds, enabling them to reinvent their businesses by offering on-demand access to a shared pool of configurable compute resources which can be rapidly provisioned with minimal...

    Provided By IBM

  • White Papers // Jan 2013

    Reduce costs and improve manageability with an IBM System x NAS solution

    IBM® System x® servers offer the efficiency, simplicity and performance that will fit both your needs and your budget. Read this solution brief to discover how System x servers, preloaded with Microsoft Windows Storage Server, offer a complete solution that is easy to manage, that reduce risk and give you...

    Provided By IBM

  • White Papers // Jan 2013

    IBM Ready Pack for Cloud: Helping SMBs Manage Growth and Costs

    The IBM Ready Pack for Cloud enables small and medium businesses (SMBs) to achieve operational efficiencies and faster time to market. This solution empowers small IT staff to rapidly deliver a virtualization infrastructure, manage multiple workloads across the cloud, and increase overall business efficiencies.

    Provided By IBM

  • White Papers // Jan 2013

    Delivering Worry-Free Storage

    For small and midsize businesses, the challenge of building an IT storage infrastructure that is both effective and affordable can be daunting: the amount of information these organizations need to store is constantly increasing, while IT budgets are staying the same, or possibly even shrinking. IT managers will most likely...

    Provided By IBM

  • White Papers // Jan 2013

    Capitalize on a highly available virtualization reference architecture

    Struggling with how to achieve consistent uptime? Address the challenges that can potentially cripple services and applications, while reducing data center costs and increasing workload performance. Leverage the industry expertise of IBM and Microsoft through validated high-availability reference architectures that offer an easy-to-implement path to a reliable and flexible high-performance,...

    Provided By IBM

  • White Papers // Jan 2013

    Storage Switzerland WP for V3700: Addressing SMB Challenges

    As small and midsize businesses (SMBs) struggle with the challenge of managing more data with fewer resources and limited budgets, the industry has responded with storage solutions that are either too small (low functionality and hard to deploy and manage) or too big (high capacity and performance with a high...

    Provided By IBM

  • White Papers // Jan 2013

    IBM Storwize V3700 Entry Disk

    IT organizations have limited resources but need to stay responsive to dynamic environments and act quickly to consolidate, simplify and optimize their IT infrastructures. The new IBM® Storwize® V3700 system provides a smarter solution that is affordable, easy to use, self-optimizing, and cloud-agile, enabling organizations to overcome storage challenges. The...

    Provided By IBM

  • White Papers // Jan 2013

    IBM Storwize V3700: Ideal for Microsoft Environments

    Working together with Microsoft, independent software vendors and customers, IBM® has identified key Microsoft technology areas that have synergy with storage solutions, IBM System x® and IBM Tivoli® products, and can help improve Microsoft IT environments. The high-performing IBM Storwize® V3700 offers support for Microsoft applications and platforms including Microsoft...

    Provided By IBM

  • White Papers // Apr 2014

    IBM Storwize V3700: Ideal for VMware Environments

    Many businesses already have deployed or are considering VMware virtualization solutions to reduce costs through server consolidation while increasing the efficiency, utilization and flexibility of their IT infrastructure. Realizing the full benefits associated with server virtualization also requires a complementary and robust shared storage foundation. The new IBM® Storwize® V3700...

    Provided By IBM

  • Downloads // Jan 2013

    Cloud for Dummies, IBM Midsize Company Limited Edition

    This book gives mid-sized companies insights on what it means to create flexible pools of computing resources that break down silos in your company so you can perform in a smarter & proactive manner.

    Provided By IBM

  • White Papers // Jan 2013

    Resource Guide: Top 10 Benefits of a Server Refresh

    Even with the increased demands and pressures of today’s business environment, how do you know if it’s really worth the expense to convert your aging server fleet? Read this resource guide to learn the top five tech benefits and top five business benefits to be found by replacing outdated servers...

    Provided By IBM

  • White Papers // Jan 2013

    Business-Class Servers for a PC Budget

    Edison Group interviewed a number of business owners running office or franchise workloads and consultants/resellers who cater to them, to assess the server-related challenges faced by these organizations, and the server features they most frequently required. Download this whitepaper to read how a server solution offered by IBM®, incorporating...

    Provided By IBM

  • White Papers // Jan 2013

    Flexible, scalable businesses with Linux and IBM System x

    Abstract option #1: Linux® running on IBM System x® and BladeCenter® provides an open, reliable and secure IT environment that can easily scale as workloads demand. The IBM System x and BladeCenter families, powered by the energy-efficient and reliable new Intel® Xeon® processors, offer a broad range of servers preloaded...

    Provided By IBM

  • White Papers // Jan 2013

    IBM x86 Servers in the Cloud: Serving the Cloud

    An analysis and perspective from leading IT Industry analysts Technology Business Research (TBR) on how x86 servers and the implementation of private clouds offer a secure and cost-effective means for midsize businesses to reduce costs and provide flexible computing capacity. IBM x86 servers, including the new System x3650 M4 and...

    Provided By IBM

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Webcasts // Feb 2013

    IPS: Evolving to Remain Relevant

    With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker John Grady, Research Manager, Security Products and Services at IDC and Paul Kaspian, Senior Product Marketing Manager for IBM Security Systems to find out...

    Provided By IBM

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Provided By IBM

  • White Papers // Feb 2013

    How web application vulnerability assessment tools can improve enterprise security

    This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.

    Provided By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Provided By IBM

  • White Papers // Feb 2013

    Glassbox testing. Thinking inside the box

    Automated tools for assessing the security of web applications fall into two main categories: Black box and white box testing. Each has its benefits and challenges, and many organizations use both to attain the best possible results. For the last few years, IBM has been researching, developing and patenting an...

    Provided By IBM

  • White Papers // Feb 2013

    Application security and risk management

    To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor the state of application security over time. The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to...

    Provided By IBM

  • White Papers // Feb 2013

    Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

    Provided By IBM

  • eBooks // Feb 2013

    Secure Web Applications: Creating a Security Culture

    Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.

    Provided By IBM

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Provided By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile environments

    As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, there are many potential vulnerabilities attackers can exploit to gain access to sensitive data. Providing security for mobile applications requires the...

    Provided By IBM

  • White Papers // Feb 2013

    Safeguarding the cloud with IBM Security solutions

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds.

    Provided By IBM

  • White Papers // Feb 2013

    How does IBM deliver cloud security?

    Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from...

    Provided By IBM

  • Case Studies // Feb 2013

    EXA Corporation creates a secure and resilient private cloud

    One of the primary reasons for slow adoption of cloud is the perceived challenge around security. For EXA Corporation, an integrated set of IBM cloud solutions for automation, security and management is enabling the company to create a secure, hybrid private cloud solution that combines proprietary and external data centers....

    Provided By IBM

  • White Papers // Feb 2013

    Secure By Design: Building Identity-based Security into Today’s Information Systems

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA&#8482) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Provided By IBM