Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • White Papers // Feb 2015

    Break out of Silos for a future-ready Identity Infrastructure

    This white paper discusses the evolution of directories from a static repository to an active contributor to identity-related interactions, examines how integration can improve directory and data access functionality, and presents IBM solutions for directory management.

    Sponsored By IBM

  • White Papers // Feb 2015

    Win the Race Against Time to Stay Ahead of Cybercriminals

    IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

    Sponsored By IBM

  • White Papers // Feb 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: - How IBM achieved an exploit block rate of 95.7% - Ratings for stability/reliability and evasion - Performance ratings based on "real-world" scenarios

    Sponsored By IBM

  • White Papers // Jan 2014

    IDEAS International Seeding Clouds on Power Systems with IBM SmartCloud Entry

    Many organizations are genuinely excited about the potential for private clouds, anticipating greater responsiveness for end users and reduced costs for administrators. However, they are also concerned with the risk of taking on added complexity as they make the transition to cloud computing, which by definition introduces new management processes...

    Sponsored By IBM

  • White Papers // Jan 2014

    Edison Group - The Business and Economic Advantages of SmartCloud Entry for Power Systems

    Companies worldwide are embracing private clouds, not only because they support new, highly efficient and secure data solutions, but also to drive new competitive organizational strategies. This white paper provides an assessment of the business value of implementing IBM SmartCloud Entry for Power Systems versus comparable private cloud solutions from...

    Sponsored By IBM

  • Podcasts // Jan 2014

    IBM SmartCloud Entry for Power Systems

    The IBM SmartCloud™ Entry on Power Systems™ solution provides a cost-competitive, entry-level private cloud solution that helps speed time to value of your service deployments on your IBM Power Systems servers.

    Sponsored By IBM

  • White Papers // Nov 2013

    Business Value of Managed Services

    Businesses around the world are looking for ways to innovate, improve customer relationships and drive down costs. But it can be challenging to find the right people and resources to support those corporate initiatives. Managed services from IBM can help

    Sponsored By IBM

  • White Papers // Jan 2014

    IBM PowerVM Virtualization Technology on IBM POWER7 Systems

    Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.

    Sponsored By IBM

  • White Papers // Oct 2014

    Considerations for Maximising Analytic Performance

    Philip Howard of Bloor Research compares performance capabilities of the leading BI platforms. Companies studied in this comparison are IBM (Cognos, DB2 with BLU Acceleration), SAP (BusinessObjects, HANA), Oracle (Business Intelligence, Exadata) and Microsoft (Business Intelligence, SQL Server). His conclusion? "DB2 with BLU Acceleration should not only provide better performance...

    Sponsored By IBM

  • White Papers // Oct 2014

    BLU Acceleration changes the game

    Born from new advances in data processing from IBM Research, IBM® DB2® with BLU Acceleration is a leap forward in database technology that raises the bar for performance and value. BLU Acceleration uses patented technologies to deliver a unique combination of performance, ease of use and cost-efficiency—with 8 to 25...

    Sponsored By IBM

  • White Papers // Oct 2014

    Shaspa - Enabling the Internet of Things

    In this real world application of Internet of Things, Shaspa partnered with IBM to leverage IBM® Informix®, for an end-to-end solution and service delivery platform for a range of market sectors, starting with a residential gateway platform. The connected environment is smart buildings that use a variety of sensor-based and...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // May 2014

    Accurately assessing economic capital with IBM Algorithmics and IBM Platform Computing

    To more accurately assess capital requirements under Solvency 2, a leading European based insurance firm needed a high performance risk environment with support for complex simulations on demand. Learn why this firm turned to IBM for its solution.

    Sponsored By IBM

  • Videos // May 2014

    IBM Platform Computing Cloud Service Demo

    This demonstration shows how an organization using IBM Platform Computing workload managers can easily and securely tap resources in the IBM SoftLayer public cloud to handle periods of peak demand and reduce total IT infrastructure costs.

    Sponsored By IBM

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Aug 2014

    Manage Identities & Access for Continuous Compliance & Reduced Risk

    Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.

    Sponsored By IBM

  • White Papers // May 2014

    What's Behind a Cyberattack?

    IBM Security QRadar Incident Forensics provides a next-generation approach to security incident forensics that supports network security, insider threat analysis - including fraud and abuse - and the documentation of incident-related evidence.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    "IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Aug 2014

    EMA Report: Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

    Sponsored By IBM

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM X-Force Threat Intelligence Quarterly Report Q2 2014

    This quarterly report from the IBM X-Force research and development team looks at how application vulnerabilities, spam threats and incident response are evolving - based on the latest data and ongoing analysis. It also includes insights from the IBM Global Technology Services division.

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security: Avoiding Insider Threats

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    Critical Data Protection Program by IBM Security Services

    Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how...

    Sponsored By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Sponsored By IBM

  • White Papers // Jul 2014

    Why Test for Skills?

    In an era when human resources departments are constantly being asked to do more with less, it’s clear that something needs to be done. As more and more resumes pile up for each position, HR teams need help to make a quality hire quickly. Fortunately, IBM Smarter Workforce technology...

    Sponsored By IBM

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Sponsored By FireEye

  • Videos // Mar 2015

    Register For the Free Optus and FireEye Webinar

    Hard to believe the world’s biggest sporting event was 229 days ago. The FIFA World Cup seems like a lifetime ago – it’s hard to remember who hosted, let alone who did well. What’s harder to believe is if you just discovered a security threat, chances are you’ve been vulnerable...

    Sponsored By Optus

  • White Papers // Mar 2015

    Qlik Executive Brief - The Link Between Sales Analytics and Sales Performance

    There is an undeniable link between the use of sales analytics and strong sales performance. An organization’s ability to grow revenue in a sustainable, predictable way relies on sales analytics. Sales organizations must find a way to aggregate, sift through, and make sense of all of their data to find...

    Sponsored By QlikTech

  • White Papers // Mar 2015

    Aberdeen Checklist - How B2B Salespeople Learn to Love Their Data

    In a recent study, Aberdeen provided a data and performance-driven bridge between two unlikely enterprise business partners: Sales Leadership and the IT team. The common ground here is sales analytics, or the business intelligence tools that leader companies more effectively leverage to support better sales forecasting, deal-making, and closing activities...

    Sponsored By QlikTech

  • eBooks // Mar 2015

    CITO Research E-Book - Empowering Sales with Self Service BI

    Read this e-book and learn how to empower sales with self-service business intelligence in order to gain better insight into your pipeline, get to know your customers better, close bigger deals faster, and uncover better cross-sell and up-sell opportunities with less effort. Download this e-book to learn more.

    Sponsored By QlikTech

  • White Papers // Mar 2015

    Infrastructure Matters: Data Analytics Overview

    Today’s real-time data platforms are helping leading organizations to better utilise information that has always resided within the business, as well as the growing volumes of new data. Read More..

    Sponsored By Fujitsu

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Provided By Global Knowledge

  • White Papers // Aug 2014

    12 Essential Tasks of Active Directory Domain Services

    Discover the 12 major tasks of Active Directory Domain Services (AD DS) administration and management, and how delegation can be an excellent way for administrators to reduce the their workload and streamline management of their AD DS infrastructures. Read the white paper and learn how the implementation of proper...

    Provided By Dell Software