Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Mar 2014

    EMA Report: The benefits of a Unified Endpoint Management Approach

    In this report, EMA analysts examine IBM Endpoint Manager as a solution to the challenges faced by organizations today when attempting to provide a unified approach to IT operations and security.

    Sponsored By IBM

  • White Papers // Feb 2013

    Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the latest security attacks with global threat intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" "scenarios"

    Sponsored By IBM

  • White Papers // Mar 2014

    IBM X-Force Threat Intelligence Quarterly - 1Q 2014

    In this first issue of a new, more nimble quarterly format, IBM X-Force examines methods and motivations of security incidents in the second half of 2013 which Chief Information Security Officers (CISOs) and other security executives can use to stay informed on the latest threats. Since late 2010, IBM X-Force...

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • eBooks // Feb 2013

    Secure Web Applications: Creating a Security Culture

    Companies move applications to the Web to improve customer interactions, lower business processing costs and speed outcomes. But driving applications to the Web also increases vulnerabilities – unless security is an integral component of the application development process.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection: An integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Feb 2013

    Application security and risk management

    To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor the state of application security over time. The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to...

    Sponsored By IBM

  • White Papers // Mar 2014

    What can you do differently to guard against threats from rapidly evolving mobile malware?

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing security risks and vulnerabilities

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Dec 2013

    Security intelligence is the smart way to keep the cloud safe

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

    Sponsored By IBM

  • Analyst Briefings // Feb 2014

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach. Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Mar 2014

    Tolly Test Report: IBM Security Web Gateway Appliance

    The report summarizes the Tolly Group’s evaluation of the performance characteristics of the IBM Security Web Gateway AMP 5100 Appliance. It finds the IBM appliance to be 100% effective in blocking inline-preventable web threats and attacks, as well as being powerful and easy to use.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing user identities and access in the cloud

    This document describes how IBM can help clients design, deploy and manage critical identity and access management controls within cloud environments. IBM is a trusted partner with the broad portfolio and comprehensive security strategy required to enable secure innovation.

    Sponsored By IBM

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing identities and access in the cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Mar 2014

    When Millions need access: Identity Management in an interconnected world

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • Analyst Briefings // Mar 2014

    Securosis Report: Security Management 2.5: Replacing Your SIEM Yet?

    In this report, analyst Securosis, go into detail on the changing organizations needs and requirements in a SIEM solution, including malware detection, and discuss the evolutionary changes to meet these demands.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Government Agencies

    IBM QRadar Security Intelligence Platform combines robust log management, security information and event management (SIEM) and risk management capabilities to help government organizations detect advanced cyber threats, exceed compliance mandates and prevent malicious insider activities.

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Apr 2012

    The Different Technologies for Cooling Data Centers

    There are 13 basic heat removal methods to cool IT equipment and to transport unwanted heat to the outdoor environment. This paper describes these fundamental cooling technologies using basic terms and diagrams. 11 of these methods rely on the refrigeration cycle as the primary means of cooling. Pumped refrigerant systems...

    Sponsored By APC by Schneider Electric

  • Webcasts // Mar 2014

    Forrester: Better Outcomes, Faster Results – A Path to Continuous Delivery

    Conditioned by experiences with mobile and cloud-based software, customers are demanding faster responsiveness to their needs. Winning or losing customers now depends on your ability to remove delivery barriers so you can produce high-quality applications on demand. The race for customers is on—are you prepared to win? Watch this...

    Sponsored By HP

  • White Papers // Apr 2013

    The business of social business.

    A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

    Sponsored By IBM

  • White Papers // Jan 2013

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • White Papers // Apr 2014

    Securing the enterprise workspace: protect your organization while supporting mobility and BYOD

    Is your mobile workforce contributing to vulnerabilities that could lead to a security breach? This white paper explains how Dell Mobility Solutions for security can help protect your organization’s information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating...

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Password Peril: The Frontline Security Challenge in the SaaS Age

    As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or...

    Sponsored By Bitium

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Sponsored By Webroot Software

  • White Papers // Mar 2014

    HP Proliant Gen8 Servers Positioning Guide

    HP ProActive Insight architecture fundamentally redefines how administration is performed across the entire server lifecycle. Powerful new capabilities automate and simplify system provisioning, troubleshooting, and software updates. Read about the four discint pillars that the HP ProLiant Gen8 Servers and HP Active Insight architecture were built around and what it...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2013

    The Business Value of the HP Proactive Insight Experience

    This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • Podcasts // Oct 2013

    Reps Sell More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is smarter selling that will help reps sell more. Oracle Sales Cloud enables sales reps to sell more anytime, anywhere and on any device and empowers them to grow their own pipeline without waiting for marketing.

    Sponsored By Oracle

  • Podcasts // Oct 2013

    Sales Cloud Overview

    Animated Video: Smarter Selling with Oracle Sales Cloud Oracle Sales Cloud is Smarter Selling that will help reps sell more, managers know more, and companies grow more.

    Sponsored By Oracle