HIT Consultant Insightful coverage of healthcare innovation
 

ibm cloud

Results 226 - 250 of 460Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Oct 06, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
cloud integration, b2b, value chain, cloud services
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : 
security solutions, layered protection, protect data, advanced analytics, ibm
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ibm, ecm, ecm users, mobile funtionalities, cloud functionalities
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
IBM open-standards-based service delivery and management solutions can control costs, enhance performance and increase security to help organizations achieve the full benefits of cloud and virtualization - while maintaining service quality, security and performance.
Tags : 
the cloud, cloud computing, transitioning, virtualization, cloud solutions, smartcloud, resource optimization, cloud architecture, application
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications faster? With IBM PureApplication solutions, companies can build and use a cloud environment faster, easier and with less risk to better engage with their customers and partners.
Tags : 
enterprise applications, the cloud, deployment, pureapplication, applications, cloud environment, enterprise
    
IBM
Published By: IBM     Published Date: May 07, 2015
In this On Demand session learn about using cloud-based social collaboration tools to streamline key areas of your business, increasing time to invest in new product development. Hear how one manufacturer turned to an IBM Business Partner to implement IBM SmartCloud Connections.
Tags : 
cloud technologies, social collaboration tools, ibm
    
IBM
Published By: IBM     Published Date: May 07, 2015
Register now and get ready for an extreme mail makeover: re-imagined for the future of work. Register now!
Tags : 
email, social technologies, ibm, cloud
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility, security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security
    
IBM
Published By: IBM     Published Date: May 07, 2015
The workplace—and they way we perform our jobs—is changing rapidly. What is the future of work, and what kinds of tools do you need to navigate it successfully?
Tags : 
ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation, millennial, email
    
IBM
Published By: IBM     Published Date: Jul 14, 2015
Begin your journey toward becoming a cognitive enterprise and start gaining unprecedented value from your own data. Watson Explorer reduces unnecessary research time and allows enterprises to work smarter and faster. Read this brochure to learn how Watson Explorer combines content and data with cognitive computing capabilities to help your organization work more efficiently and make better decisions.
Tags : 
ibm, watson, software, explorer, applications, developer, cloud
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
How do you successfully transition business continuity to the cloud? Read the white paper to learn how an end-to-end, scalable solution can help you plan and execute an enterprise-wide continuity and resiliency strategy. As a result, you will be able to help improve risk management, reduce costs, facilitate resilient service delivery and respond to changes more quickly..
Tags : 
ibm, cloud, resiliency strategy, risk management, resilient service delivery, service delivery, service delivery solutions
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
ibm, cloud, analytics, mobile, social, security, infrastructure, data center, data center transformation
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, services provider, services provider selection, it organizations, it service providers, reduce cost, technology innovation, top ten criteria
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security, big data, it security, data center, enterprise networks
    
IBM
Published By: IBM     Published Date: Oct 07, 2015
Whether you work in marketing, customer service, sales, finance, operations or another area of your business, IBM predictive analytics software puts a wealth of advanced capabilities at your fingertips, anywhere you need them—on premises, on cloud or as a hybrid solution.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security, data
    
IBM
Published By: IBM     Published Date: Dec 02, 2015
The webinar will highlight how collaboration in the cloud can help companies realize cost savings and operational efficiencies that lead to greater business success. Clients will learn how IBM and IBM Business Partners can help them get there, regardless of their current starting point.
Tags : 
    
IBM
Published By: IBM     Published Date: Dec 02, 2015
Fresh off the presses! The IBM Connections Files cloud offering is now available in our cloud. If you are already an IBM Connections customer there's nothing for you to do. However, if you've been thinking about starting with IBM Connections, this might be a good place to start as you get just the core file sharing and sync component of IBM Connections and then upgrade to full the IBM Connections suite as your team needs more capabilities.
Tags : 
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.