Project Management

Keep your IT project running smoothly by reading our experts' tips and best practices about methodologies, agile, software, collaboration, risk management, and learning from failed projects.

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Mar 2014

    IBM QRadar Security Intelligence: Perception Capture Study

    Ponemon Institute conducted 1:1 confidential interviews with 25 IT security practitioners from U.S. companies for this independent study of QRadar SIEM users. Figures presented include total costs to acquire, deploy and run QRadar.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Government Agencies

    IBM QRadar Security Intelligence Platform combines robust log management, security information and event management (SIEM) and risk management capabilities to help government organizations detect advanced cyber threats, exceed compliance mandates and prevent malicious insider activities.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Retail

    IBM QRadar Security Intelligence Platform can serve as the foundation of retail organizations’ network defense capabilities, helping to guard against an expanding population of attackers seeking everything from credit card data to intellectual property to customer shopping behaviors.

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Aug 2014

    Select the Right Solution for Identity and Access Assurance 

    This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and...

    Sponsored By IBM

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • White Papers // Feb 2013

    Avoiding Insider Threats to Enterprise Security

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • White Papers // Aug 2014

    Manage Identities & Access for Continuous Compliance & Reduced Risk

    Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // May 2014

    Gartner 2013 MarketScope Report for Web Access Management

    Industry analyst firm Gartner, Inc. reviews vendor solutions for Web Access Management (WAM). Download the Nov. 2013 Gartner report to learn: Emerging trends in WAM market; Typical WAM use cases and solutions; WAM vendor rankings and analysis

    Sponsored By IBM

  • White Papers // Jul 2014

    Using IBM Social Business to Take Your Business Relationships to the Next Level: A Game Changer for Small, Medium, and Large Businesses.

    This IBM Redguide™ publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can...

    Sponsored By IBM

  • Case Studies // Oct 2014

    Pervasive Technology Trends: Implications for your Data Center

    Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy...

    Sponsored By IBM

  • Presentations // Apr 2014

    What the C-suite Needs to Know about the Economics of IT Risk and Reputation

    View the presentation “Understanding the economics of IT risk and reputation”—based on a ground-breaking survey of 2,316 IT professionals conducted by Ponemon Institute and sponsored by IBM—to examine the costs behind this number and build a better business case for business continuity and IT security. Use it to demonstrate the...

    Sponsored By IBM

  • White Papers // Apr 2014

    Five Essentials for Better Workforce Continuity-Integrating the Human Side into Your Strategy

    No matter how slight the risk appears, organizations know that the threat of a disaster is always a possibility. Many organizations—and most likely yours—have taken steps to incorporate disaster recovery planning for their facilities and technology. But you may not have fully considered the impact of a disruption on your...

    Sponsored By IBM

  • Research // Feb 2013

    Source Business Technology Resiliency Capabilities

    Most business continuity management teams today are understaffed, consisting of just a few dedicated corporate resources and regional or business unit representatives. Sound familiar? If so, outsourcing your organization’s business resiliency planning, strategy and program design can be a cost-effective, efficient option. In a study of global business continuity vendors,...

    Sponsored By IBM

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Jan 2014

    ALDM Service Engagement Guide

    Decisions to optimize the data center often begin with IT discovery. But many discovery processes are costly and tedious to use. IBM’s Analytics for Logical Dependency Mapping (ALDM) service automates IT discovery and leverages analytics to provide a more complete, accurate picture of the IT environment in as little as...

    Sponsored By IBM

  • White Papers // Jan 2014

    Pervasive Technology Trends Shaping the Business and the Implications for Your Data Center

    Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy...

    Sponsored By IBM

  • White Papers // Oct 2014

    10 Essential Elements for a Secure Enterprise Mobility Strategy

    With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting new levels of productivity.

    Sponsored By Citrix Systems

  • White Papers // Oct 2014

    The Forrester Wave Report: Enterprise Mobile Management, Q3 2014

    According to Forrester, early MDM solutions that focused on device management are growing into broader enterprise mobile management (EMM) solutions which can help I&O professionals mature their mobile strategy. In the Forrester Wave report, Forrester evaluates the 15 most significant EMM providers and details how each vendor fulfills the 27...

    Sponsored By Citrix Systems

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Sponsored By McAfee

  • White Papers // Sep 2014

    Customer Service: Exploit the Value of Content to Drive Service Quality and Customer Satisfaction

    Great service is delivered one customer at a time and improving interactions across all channels means truly understanding customer wants and needs. Massive amounts of unstructured data exist in your organization and can deliver customer insight that is specific, relevant and actionable. Learn how to harness that data to provide...

    Sponsored By IBM

  • Downloads // May 2014

    Find, Analyze & Resolve Your Toughest Performance Issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • White Papers // Sep 2014

    Why App Performance Matters More than Ever

    The expectation for superior end-user Quality of Experience (QoE) has never been greater. What does this mean for your consumers? And why is superior application performance more important than ever? Failure to deliver quality apps can lead to lower productivity, decreased revenue and market share, and permanent damage to brand...

    Sponsored By Equinix

  • White Papers // Oct 2014

    5 Best Practices for Managing and Securing Enterprise Tablets

    Tablet-equipped employees can help increase productivity, collaboration, and profits, but they also present challenges. These best practices can help maximize the benefits of tablets while minimizing management hassles and security risks.Dell tablets with up to Intel® Core™ i5 ProcessorIntel, the Intel logo, Intel Core, Intel vPro, Core Inside...

    Sponsored By Dell and Intel®

  • Research // Aug 2014

    Overcoming 5 Roadblocks in your Ticketless IT Journey

    Get beyond the obstacles that limit your help desk efficiency and start your journey to ticketless IT.. Take your first step by viewing this eye-opening infographic.

    Sponsored By HP

  • White Papers // Mar 2014

    5 Essentials for Protecting Against Advanced Persistent Threats (APTS)

    Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies. This paper clarifies the nature of APT risks and provides recommendations on how organizations can better protect themselves. Read more...

    Sponsored By Websense

  • Presentations // Apr 2014

    Meg Whitman Presents Unlocking IT with Big Data

    Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. During this Web Event...

    Sponsored By Hewlett Packard

  • White Papers // Sep 2014

    Gartner’s Best Practices for Implementing Automation - Japanese

    Follow a systematic approach. Opportunistic implementations may backfire, leading to incompatibilities and added expense and risk. Read Gartner’s advice for maximizing the benefits of data center automation.

    Sponsored By HP

  • White Papers // Sep 2014

    Process Powered Change Management - Japanese

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • White Papers // Oct 2014

    The Evolving Role of the Controller

    The role of the financial controller is changing in ways that mirror those of the broader finance function. Organizations will need to be aware of the changing role of senior finance professionals, the increasing demand for their time and services, the skill set they must possess, and how to fill...

    Sponsored By NetSuite AU

  • White Papers // Oct 2014

    How TCO Benefits Make Cloud Computing a No Brainer

    A detailed TCO evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications. NetSuite analysed the economic benefits of the cloud model in the ERP and CRM space by comparing the TCO of NetSuite's SaaS-based ERP and CRM solution with that of on-premises solutions from vendors such...

    Sponsored By NetSuite AU

  • White Papers // Oct 2014

    Buyer's Guide to CRM Solutions

    Industry-Driven Insights into Trends, Value and Evaluation Criteria for any decision-maker - including sales, service, marketing and IT executives - evaluating a customer relationship management (CRM) or sales force automation (SFA) project.

    Sponsored By NetSuite AU

  • White Papers // May 2014

    Whitepaper: HR in the Cloud

    The human resources function is undergoing a fundamental transformation. The old ways of doing business won't work in the new modern global economy. Read the whitepaper to explore the five business trends driving the rapid adoption of SaaS business solutions and discover why businesses like yours are moving to SaaS.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Taking Measure of Talent

    As business models change, the pressure to leverage the true value of your human capital and better understand your talent management grows. This Harvard Business Review Analytic Services whitepaper, sponsored by Workday, focuses on effective management of your human capital and using technology to gain insight into your workforce.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Simplify HR to Drive Performance Leading HR Organizations Share Their Strategies

    Global organizations must be responsive to market realities to drive performance, whether those realities are new government regulations, healthcare reform, business model shifts, or industry upswings and downturns. Read the whitepaper to learn how Workday customers are taking steps to proactively prepare for these inevitabilities.

    Sponsored By Workday

  • Videos // Mar 2014

    Product Preview: Operational Intelligence Through Actionable Analytics

    In this product preview, you will learn how simple it is for managers to get the right data, analyze the information, and respond immediately to what they’ve learned. With Workday built-in actionable analytics, all users can get relevant information to help improve the overall operational intelligence throughout the organization.

    Sponsored By Workday

  • Videos // Mar 2014

    Product Preview: Mobile

    Mobile devices are changing the way every-day work gets done. To ensure your workforce has the necessary insight, information, and intelligence, they must be armed with mobile apps that make work seamless. Watch the video to discover how Workday gives your workforce the freedom to be productive anytime, anywhere.

    Sponsored By Workday