HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 126 - 150 of 422Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analystís Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : 
ibm, gartner, data, dcap, data-centric audit protection, security
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : 
ibm, data, security, big data
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security intelligence, bigfix, technology, best practices
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you canít fix what you canít see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
cyberattack, ibm, security, access protection
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
economics, forresster, ibm, security, network protection, performance
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
In this study commissioned by IBM, Forrester Consulting evaluates the changing security threats enterprises face today, as well as the evaluation and adoption trends regarding IPS as a result.
Tags : 
forrester, ibm, security, consulting, access security, best practices, technology
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access manager, best practices
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraudóall while helping to lower costs and improve the customer experience.
Tags : 
security, best practices, fraud management, financial organizations, business management, ibm
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, idc, ciso, cloud security, saas
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments.
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems
    
IBM
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : 
ibm, mobile, security, mobility
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Securing mobile productivity for Microsoft Office 365: IBM MaaS360 enables you to deploy Microsoft tools with robust security across all mobile platforms This white paper explains why IBM MaaS360 is the right choice for deploying and securing the Microsoft ecosystem across all mobile platforms, including Microsoft Windows 10. The focus is on enabling IT to efficiently manage enterprise productivity, connectivity and security in the mobile world of today and tomorrow.
Tags : 
ibm, mobile, mobile productivity, microsoft office 365
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Enable secure access to critical data and applications, while mitigating the risk of mobile malware
Tags : 
ibm, mobile, ciso, mobile security
    
IBM MaaS360
Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.
Tags : 
ibm, data security, data security, ibm security gaurdium
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : 
ibm, big data, data security, risk management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.