HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 201 - 225 of 418Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 07, 2016
Be the “Yes Guy” in IT with IBM Cloud Security Enforcer and expand secure adoption of cloud apps in the enterprise.
Tags : 
ibm, cloud, apps, security, protection
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Accelerate Cloud Adoption and Safeguard the Business
Tags : 
ibm, cloud, security, enforcer
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection, intrusion prevention
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe, cloud, information management
    
IBM
Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
With Adobe Document Cloud you can win and retain the best, slash costs and delays, and free everyone to focus on the projects that drive your organization forward.
Tags : 
ibm, human resources, talent, adobe, document cloud sales management, contracts, e-signatures, quote to cash, sales contract management, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: IBM     Published Date: Oct 13, 2015
This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security, endpoint solution, malware, advanced persistent threats, cybercriminal
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, threat, ciso, enterprise, security, data
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
How can your organization better prepare for a security incident?
Tags : 
ibm, x-force, threat intelligence, security, cybercriminal, security, data, malwarre
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal, malware protection
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web, i2p
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance, qradar
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security, data
    
IBM
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android, apple, mobile
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ibm, fiberlink, maas360, apple, ios, data security, information sharing
    
IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.