Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • White Papers // Feb 2015

    A*STAR - The Agency for Science, Technology and Research

    A*Star had high levels of user discontent and not enough computational resources for the population of users or the number of research projects. Platform LSF acted as the single unifying workload scheduler and helped rapidly increase resource utilization.

    Provided By IBM

  • Webcasts // Feb 2015

    Enterprise Mobility: The Year in Review with Ovum

    With 2014 almost in the books, we once again joined forces with Ovum analyst, Richard Absalom, to revisit our trends and look to the future of mobile in the enterprise.Watch as we look back at our 2014 predictions, explore how fast the EMM market is maturing, and look into new...

    Provided By IBM

  • White Papers // Feb 2015

    Why OpenStack for Private Cloud?

    Today's dynamic business requirements cannot be effectively served by traditional segmented and siloed IT infrastructures. This technical bulletin discusses how the OpenStack project was created to respond to new requirements for an open, massively scalable, cloud operating system capable of supporting today's dynamic "cloud-aware" applications. Intel Inside®. Powerful Cloud...

    Provided By Dell

  • White Papers // Feb 2015

    When Millions Need Access: Identity MGMT in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Provided By IBM

  • White Papers // Feb 2015

    Mitigating Risk with Security Intelligence and Identity Assurance

    IBM Security QRadar and IBM Security identity and access management solutions deliver out-of-the-box integration, enabling organizations to quickly identify anomalies in user behavior, protect against insider fraud and demonstrate compliance with growing security regulations.

    Provided By IBM

  • White Papers // Feb 2015

    Break out of Silos for a future-ready Identity Infrastructure

    This white paper discusses the evolution of directories from a static repository to an active contributor to identity-related interactions, examines how integration can improve directory and data access functionality, and presents IBM solutions for directory management.

    Provided By IBM

  • White Papers // Feb 2015

    The Thriving Malware Industry: Cybercrime Made Easy

    The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can...

    Provided By IBM

  • White Papers // Feb 2015

    Holistic Fraud Prevention: Transforming the Customer's Experience

    Financial institutions are on a perpetual quest to improve customer engagement to drive increased transactions, account balances, loyalty and ultimately, profitability. Providing exceptional service to online banking customers is particularly critical. Unfortunately, the imprecise, antiquated fraud controls that many financial institutions rely on are not only failing to protect...

    Provided By IBM

  • White Papers // Feb 2015

    Old Techniques, New Channel: Mobile Malware Adapting PC Threat Techniques

    With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC. Read this white paper to learn more about the emerging attack techniques...

    Provided By IBM

  • White Papers // Feb 2015

    Financial Malware Explained

    Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim’s account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of protection across devices and the fraud lifecycle....

    Provided By IBM

  • White Papers // Feb 2015

    2013 IBM Chief Information Security Officer Assessment

    Building on the 2012 Finding a Strategic Voice IBM study, CAI interviewed 41 executives with information security responsibilities to identify behavior and practices that could strengthen the role and influence of security leaders.

    Provided By IBM

  • White Papers // Feb 2015

    Exceeding PCI Compliance Requirements with Robust IBM Security Solutions

    IBM Security solutions provide a cost-effective, integrated approach to exceeding PCI DSS compliance mandates so organizations can leverage insights from across their heterogeneous systems - people, data, applications and infrastructure - to protect cardholder data from the latest threats.

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security Products Provide Intelligence, Integration, Expertise for Federal Environments

    In the era of big data, complex infrastructures and sophisticated security threats, IBM delivers products and services based on three main tenets - intelligence, integration, expertise - to help federal departments and agencies achieve secure environments using security intelligence.

    Provided By IBM

  • White Papers // Feb 2015

    The Challenge of Digital Security: What Will it take for Retailers to Protect Themselves?

    In the last year some of the world's most prominent retailers have suffered some of the most devastating data security failures ever. What are the best ways to safeguard against the evolving threats? How can management be confident that the choices they make are as effective--and cost-effective--as they can be?

    Provided By IBM

  • White Papers // Feb 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Provided By IBM

  • Videos // Feb 2015

    Prevent Insider Threats with IBM Security Privileged Identity Manager (PIM)

    See how IBM Security Privileged Identity Manager's Privileged Session Recorder option helps detect and block insider threats by recording and storing every action made in a privileged user's session.

    Provided By IBM

  • Videos // Feb 2015

    Threat Aware IAM for the Open Enterprise

    Companies are transforming their IT environment by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering their networks to access corporate information. As such, Identity has become a key security parameter that businesses want...

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security Identity Governance and Administration

    IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

    Provided By IBM

  • White Papers // Feb 2015

    Win the Race Against Time to Stay Ahead of Cybercriminals

    IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

    Provided By IBM

  • White Papers // Feb 2015

    Managing Security Risks and Vulnerabilities

    Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Provided By IBM

  • White Papers // Feb 2015

    Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk

    Phasing out older hardware, operating systems or eliminating outdated versions of Oracle® that may require expensive extended support contracts can be an effective way to control operational costs, but can also present a new set of challenges. Learn how you can ensure migration success by following the established best practices...

    Provided By Dell Software

  • White Papers // Feb 2015

    Improving analytics and reporting with near real-time data replication

    Your business relies on data analytics for business intelligence, but if the data isn't up to date, the analytics are worthless. In this technical brief, see how to replicate real-time data, whether it’s onsite, remote or cloud.

    Provided By Dell Software

  • White Papers // Feb 2015

    Cisco Case Sttudy

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Provided By IBM

  • White Papers // Feb 2015

    Cloud Requires Dynamic Security

    Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

    Provided By IBM

  • White Papers // Feb 2015

    Safeguarding the Cloud with IBM Dynamic Cloud Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

    Provided By IBM

  • White Papers // Feb 2015

    Securing Applications for a Safer Cloud Environment

    This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

    Provided By IBM

  • White Papers // Feb 2015

    Get On Your Way to a Secure Mobile Enterprise

    This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.

    Provided By IBM

  • White Papers // Feb 2015

    The State of Mobile Security Maturity

    In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-à-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.

    Provided By IBM

  • White Papers // Feb 2015

    Drones for Good

    The Government of UAE, in collaboration with Indra, has launched "The UAE Drones for Good Award", recognizing the most promising prototypes that will improve people's lives. The following infographic explores how civilian drones are changing the world, looking at implications for different industries. Furthermore it depicts the top 5 industries...

    Provided By Drones for good

  • White Papers // Feb 2015

    Technical Overview: Anatomy of the Cloudant DBaaS

    Deciding which data management platform will provide the best performance takes a lot of research and planning. A Database as a Service (DBaaS) solution like Cloudant helps accelerate the process. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    A Managed File Transfer Center of Excellence

    Are you a visual thinker? This graphic representation provides the big picture for choosing the right person-centric file transfer solution for your organization. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    The Total Economic Impact of IBM Information Integration and Governance Solutions: Cost Savings and Business Benefits Enabled by IBM

    IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by leveraging IBM InfoSphere Information Integration and Governance (IIG) solutions. To assess the total financial benefit associated with increasing data governance maturity through IIG implementation, Forrester interviewed...

    Provided By IBM

  • White Papers // Feb 2015

    Forrester Wave for Data Governance Tools

    IBM Named a Leader in the First Forrester Wave for Data Governance Tools In Forrester Research’s report, The Forrester Wave™: Data Governance Tools, Q2 2014, IBM has been named a leader and has earned the highest scores for both strategy and market presence. Review the analysis to learn about the...

    Provided By IBM

  • White Papers // Feb 2015

    Information Governance Best Practices: Adopt a Use Case Approach

    When should you implement integration governance? According to this Gartner research note, you should start now if you are an IT professional considering an initiative like master data management (MDM), e-discovery, information archiving or cloud migration should start implementing information governance now.

    Provided By IBM

  • eBooks // Feb 2015

    Insights for the New Chief Data Officer

    How should a chief data officer start formulating and deploying a strategy to put data at the center of the business? This ebook provides insights and recommendations for the CDO in three areas: strategic alignment with the business, data strategy and project prioritization.

    Provided By IBM

  • White Papers // Feb 2015

    10 Cooling Solutions to Support High-Density Server Deployment

    High-density servers present an organisation with a massive performance benefit, but does this benefit out-weigh the challenge and cost of the cooling systems needed to support them? Discover the top ten solutions used by organisations to ensure their cooling efficiency and capacity is optimised for the density and workload...

    Provided By APC by Schneider Electric

  • White Papers // Feb 2015

    Applied Study on E-Marketing Websites with Designing Home Delivery Service Website

    E-commerce is a new term in the online world. It makes buying and selling, transferring funds, advertising and displaying products easy. This paper is to design an e-marketing website that deal with the problems in previous sites. Top ten sites in e-marketing according to the most frequently used search engines...

    Provided By International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)

  • White Papers // Jan 2015

    Application Performance Management Is Critical To Business Success

    This Application Performance Management Forrester Consulting study captures insight into the benefits and challenges with today’s IT monitoring solutions as well as the types of monitoring features that will help meet application performance and availability expectations. Read More..

    Provided By IBM

  • White Papers // Jan 2015

    Forrester Engage Audit Professionals For Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program. Read More..

    Provided By IBM