HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 276 - 300 of 415Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security, big fix, advanced threats, security, security intelligence, endpoint security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network, xgs, forrester, tei, total economic impact
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : 
ibm, security, access management, access manager
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : 
ibm, security, access management, access manager, integrated access management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access management, access manager, kuppingercole, leadership compass
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime, cyber security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, security, web fraud, fraud protection, cyber security
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time.
Tags : 
ibm, security, big fix, advanced threats, security, security intelligence, endpoint security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
ibm, security, identity governance and intelligence, identity governance, gdpr, governance
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements, compliance
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, security, managed security monitoring
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : 
ibm, security, ibm x-force, threat intelligence
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.