HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 301 - 325 of 418Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security
    
IBM MaaS360
Published By: IBM     Published Date: Jan 07, 2016
Be the “Yes Guy” in IT with IBM Cloud Security Enforcer and expand secure adoption of cloud apps in the enterprise.
Tags : 
ibm, cloud, apps, security, protection
    
IBM
Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise, security
    
IBM MaaS360
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : 
cloud environment, web application, cloud-based security, ibm, ibm security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, cloud, security, threats, usage, application
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : 
ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise, mobile device platform, it management, malware, spam, phishing, bluetooth, wi-fi, theft
    
IBM
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Securing mobile productivity for Microsoft Office 365: IBM MaaS360 enables you to deploy Microsoft tools with robust security across all mobile platforms This white paper explains why IBM MaaS360 is the right choice for deploying and securing the Microsoft ecosystem across all mobile platforms, including Microsoft Windows 10. The focus is on enabling IT to efficiently manage enterprise productivity, connectivity and security in the mobile world of today and tomorrow.
Tags : 
ibm, mobile, mobile productivity, microsoft office 365
    
IBM MaaS360
Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
    
IBM Software
Published By: IBM     Published Date: Apr 09, 2015
IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.
Tags : 
ibm, security, risk management, mobile device security
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal, malware protection
    
IBM
Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security, cyber threats
    
IBM
Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard, protection, threat protection, it security, security iq
    
IBM
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing
    
IBM Software
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
IBM
Published By: Group M_IBM Q418     Published Date: Nov 01, 2018
Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. That is why IBM Resilient® was developed: to arm security teams with a platform for managing, coordinating, and streamlining incident response (IR) processes. IBM Security has had the privilege of working with organizations of all sizes and across all industries as they implement Resilient solutions to develop more sophisticated and robust incident response functions. These organizations build IR processes that are consistent, repeatable, and measurable, rather than ad hoc. They make communication, coordination, and collaboration an organization-wide priority. They leverage technology that empowers the response team to do their job faster and more accurately
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner
    
IBM
Published By: IBM     Published Date: Oct 07, 2014
A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.
Tags : 
ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions, vulnerabilities
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: IBM     Published Date: Jun 26, 2014
Achieve more stable, effective and manageable endpoint security with Stateful Application Control.
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.