HIT Consultant Insightful coverage of healthcare innovation
 

ibm ep

Results 251 - 275 of 485Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure
    
IBM
Published By: IBM     Published Date: Oct 01, 2014
Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next. The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, combined, trusted 360-degree view of all data related to customers, accounts, products and other entities. The combined solution enables organizations to gain a deeper understanding of customer sentiment, increase customer loyalty and satisfaction, and get the right information to the right people to provide customers what they need to solve problems, cross-sell and up-sell.
Tags : 
data integration, customer loyalty, customer service, big data
    
IBM
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Securing mobile productivity for Microsoft Office 365: IBM MaaS360 enables you to deploy Microsoft tools with robust security across all mobile platforms This white paper explains why IBM MaaS360 is the right choice for deploying and securing the Microsoft ecosystem across all mobile platforms, including Microsoft Windows 10. The focus is on enabling IT to efficiently manage enterprise productivity, connectivity and security in the mobile world of today and tomorrow.
Tags : 
ibm, mobile, mobile productivity, microsoft office 365
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile
    
IBM MaaS360
Published By: IBM     Published Date: Jan 16, 2015
Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
ibm, b2b services reporting, b2b services analytics, trading partner relationships, business decision making, b2b transactions, transactional data
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.
Tags : 
ibm, ibm x-force, ip reputation tracking, iot, security landscape
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : 
security solutions, layered protection, protect data, advanced analytics, ibm
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM® Operational Decision Manager Advanced brings together data from different sources to recognize meaningful trends and patterns. It empowers business users to define, manage and automate repeatable operational decisions. As a result, organizations can create and shape customer-centric business moments.
Tags : 
ibm, customer-centric business, operational manager, decision manager, business policies
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, credentials theft, identity management policies, anti-malware software
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility, security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions, productivity, reputation
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web, i2p
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
Join Steve Mirman, IBM MobileFirst solution architect, for this deep-dive intro into how you can speed development, simplify deployment and actively manage all of your mobile apps with a single, analytics-based console using our Platform in the cloud.
Tags : 
ibm, mobile, application, development, mobilefirst platform
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : 
ibm, gartner, magic quadrant, identity governance, administration
    
IBM
Published By: IBM     Published Date: Jan 14, 2016
Built using the IBM® InfoSphere® Information Server, IBM BigInsights® BigIntegrate and BigInsights BigQuality provide the end-to-end information integration and governance capabilities that organizations need.
Tags : 
ibm, biginsights, bigintegrate, bigquality, data, ecosystem, governance, integration
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
With Watson Explorer, you can keep enterprise search as the foundation and transform search into Cognitive Exploration. Leveraging technological advances such as deep search and exploration, advanced content analytics, and cognitive capabilities, IBM Watson Explorer provides a unified view of the information you need, combining data from multiple internal silos and a variety of outside datasets including social media. Stop limiting your search to traditional data sources in the new, non-traditional data world.
Tags : 
watson explorer, ibm, deep search, content analytics, enterprise software
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
IBM Sametime and IBM Connections Meetings Cloud are named a Leader in the recent Ovum Decision Matrix report.
Tags : 
ibm, ovum, virtual meetings, online meetings, teleconferencing
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Learn about the latest IBM DevOps solutions for IBM z Systems mainframe that can accelerate and simplify deployments. Attend this session to find out about leveraging skills and teams dealing with multiple tools, processes and platforms.
Tags : 
ibm, z systems, devops, software delivery
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.