IBM

Displaying 1-40 of 3706 results

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Analyst Briefings // Mar 2014

    Magic Quadrant for Master Data Management of Customer Data Solutions

    Read this Gartner Report: Gartner Magic Quadrant for Customer Master Data This Gartner's Magic Quadrant offer insight into the part of the packaged MDM solution market that focuses on how organizations master and share a "single version" of customer data.

    Sponsored By IBM

  • White Papers // Feb 2014

    Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems

    This IBM-commissioned profile of US enterprise IT security professionals evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.

    Sponsored By IBM

  • White Papers // Feb 2014

    ICSA Labs Network IPS Certification Testing Report

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Feb 2014

    Reducing the Cost and Complexity of Endpoint Management

    IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations - helping provide continuous visibility, control and compliance while reducing costs and the burden on IT staffs.

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the Latest Security Attacks with Global Threat Intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

    Sponsored By IBM

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks.

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Mar 2014

    Protect people, processes and technology from web Application Threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Mar 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download the Nov. 2013 Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based access.

    Sponsored By IBM

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • eBooks // Nov 2013

    The MDM advantage: Creating insight from big data

    To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM)...

    Sponsored By IBM

  • White Papers // Feb 2015

    Tolly Test Report: IBM Security Access Manager Appliance

    The report summarizes the Tolly Groups evaluation of IBM Security Access Manager Appliance for web protection, performance, and ease-of-use.

    Sponsored By IBM

  • White Papers // Feb 2015

    Strengthen Security with Intelligent Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activi-ties are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Feb 2015

    Security on System z eGuide

    IBM System z security provides a core set of robust services such as cryptographic hardware, system integrity, EAL5 certification and more. While it might be the perfect place to store sensitive data and perform business critical transactions and analytics it can also be a target for would-be cyber criminal and...

    Sponsored By IBM

  • White Papers // Mar 2015

    Fortifying for the future: Insights from the 2014 IBM Chief Information Security Officer Assessment

    IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more...

    Sponsored By IBM

  • White Papers // Mar 2015

    Stepping up the Battle Against Advanced Threats

    Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.

    Sponsored By IBM

  • White Papers // Feb 2015

    Securing Applications for a Safer Cloud Environment

    This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

    Sponsored By IBM

  • White Papers // Feb 2015

    The State of Mobile Security Maturity

    In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-à-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.

    Sponsored By IBM

  • White Papers // Feb 2015

    Behavior-based Protection Strategies from the Network to Remote Endpoints.

    This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.

    Sponsored By IBM

  • Analyst Briefings // Feb 2015

    Magic Quadrant for Intrusion Prevention Systems

    Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM X-Force Threat Intelligence Quarterly - 4Q 2014

    Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

    Sponsored By IBM

  • White Papers // Feb 2015

    Securing the Mobile Enterprise with IBM Security Solutions

    IBM mobile security solutions are designed to help organizations protect critical data at the device, content, application and transaction levels. The portfolio also includes a unique layer of security intelligence for detecting and mitigating the latest advanced threats.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Dynamic Analyzer

    IBM Security AppScan® Dynamic Analyzer is designed to help secure your organization’s web applications deployed on IBM Bluemix™ by detecting dozens of today’s most pervasive published security vulnerabilities. It provides a progressive, self-controlled web application security approach.As part of the application development lifecycle, IBM Security AppScan Dynamic Analyzer helps eliminate...

    Sponsored By IBM

  • White Papers // Mar 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Sponsored By IBM

  • White Papers // Mar 2015

    Good Apps, Bad Apps - The Cost Of Creating Exceptional Mobile Moments Through Mobile Apps

    In August 2014, IBM commissioned Forrester Consulting to examine the impact of “good” or “bad” mobile applications on a company’s brand, revenue, and cost structure through primary research and the creation of a cost framework and model. Forrester performed three studies to identify the characteristics of good and bad mobile...

    Sponsored By IBM

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • Live Event // Mar 2015

    IBM MobileFirst Roundtable: Creating Exceptional Mobile Experiences - Invitation

    A good app can increase traffic, sales, employee productivity and brand satisfaction. A good mobile app strategy including right design, development, integration, and management, enables businesses to maintain their competitiveness and reduce costs. A bad App strategy will do the opposite. Join us at this complimentary roundtable and take control...

    Sponsored By IBM

  • White Papers // May 2015

    The Next-Generation Data Center: A Software Defined Environment Where Service Optimisation Provides the Path

    This white paper explores IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

    Sponsored By IBM

  • Webcasts // Apr 2015

    Real Experiences: Transforming Application Delivery for Continuous Innovation

    Key Takeaways: Learn from real experiences in transforming large organizations for increased speed and quality using a DevOps approach. Explore the characteristics and behavior of fast-moving companies, based on hundreds of assessments, interviews and implementations. Begin a self-assessment designed to give you a better understanding of your organization's readiness and...

    Sponsored By IBM

  • eBooks // Apr 2015

    Agile for Dummies

    Confused by all the agile advice? Relax! With Agile For Dummies by your side you'll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.

    Sponsored By IBM

  • White Papers // Apr 2015

    Ten Answers Regarding Mobile App Testing

    This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test...

    Sponsored By IBM

  • White Papers // Apr 2015

    Service Virtualization For Dummies

    Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Apr 2015

    Security Essentials for CIO's: Establishing a Department of Yes

    Security Essentials for CIOs: Establishing a "Department of Yes". IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. Learn more in this whitepaper.

    Sponsored By IBM