HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 1 - 25 of 418Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
With Adobe Document Cloud you can win and retain the best, slash costs and delays, and free everyone to focus on the projects that drive your organization forward.
Tags : 
ibm, human resources, talent, adobe, document cloud sales management, contracts, e-signatures, quote to cash, sales contract management, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM retained its position as a "Leader" in the 2017 Gartner Magic Quadrant for Application Security Testing. Read our complimentary version of the Gartner report to learn: Critical trends in the Application Security Testing market. Why IBM maintained a Leadership position in a report that spanned 18 Application Security vendors. Detailed criteria that determine how all of the vendors are positioned in the Magic Quadrant.
Tags : 
ibm, application security, gartner, application security testing
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Keeping sensitive data secure in the age of Cloud computing. Learn how IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
protecting data, ibm security, guardium, cloud enviornments, hybrid cloud enviornment
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
identities, manage identities, manage application access, application access
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
security identity governance, access governance
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
This IDaaS checklist will help you determine whether IBM Cloud Identity Service is right for you. Chances are - it is!
Tags : 
idaas, ibm cloud identity service, security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 08, 2018
Research commissioned by IBM reveals consumer preferences for identity authentication, including biometrics and multifactor authentication.
Tags : 
security, identity authentication, multifactor authentication
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Ponemon Institute is pleased to present The Value of Artificial Intelligence in Cybersecurity sponsored by IBM Security. The purpose of this research is to understand trends in the use of artificial intelligence and how to overcome barriers to full adoption.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
POWER9 provides the infrastructure foundation for a future-looking organization that is ready to meet today’s business challenges and tomorrow’s advancements. By updating your foundation with the latest POWER9-based servers, you can effectively run your mission-critical requirements alongside modern, dataintensive workloads. POWER9 gives you the reliability you’ve come to trust from IBM Power Systems, the security you need in today’s high-risk environment, and the innovation to propel your business into the future.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
    
Group M_IBM Q418
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.