HIT Consultant Insightful coverage of healthcare innovation
 

ibm security

Results 26 - 50 of 418Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 04, 2018
IBM Security Guardium Analyzer is a SaaS offering designed to help compliance, data and IT managers get started on the GDPR journey.
Tags : 
    
IBM
Published By: IBM     Published Date: May 09, 2018
Does the future of digital trust lie in artificial intelligence (AI)? Join the conversation between Valerie Bradford, product marketing manager at IBM Security, and Andras Cser, vice president and principal analyst serving security and risk professionals at Forrester, to discover how AI is changing the landscape of digital identity. Key takeaways: Understand how AI is helping organizations respond to current changes in the threat landscape. Examine how companies are using AI to establish trust in digital identities. Hear how AI is changing the end-to-end customer journey by improving the digital experience.
Tags : 
digital trust, security, digital identity
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
data protection, ibm security, guardium, hybrid cloud
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : 
ibm security, guardium, regulatory, compliance
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 08, 2018
Research commissioned by IBM reveals consumer preferences for identity authentication, including biometrics and multifactor authentication.
Tags : 
security, identity authentication, multifactor authentication
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM retained its position as a "Leader" in the 2017 Gartner Magic Quadrant for Application Security Testing. Read our complimentary version of the Gartner report to learn: Critical trends in the Application Security Testing market. Why IBM maintained a Leadership position in a report that spanned 18 Application Security vendors. Detailed criteria that determine how all of the vendors are positioned in the Magic Quadrant.
Tags : 
ibm, application security, gartner, application security testing
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Keeping sensitive data secure in the age of Cloud computing. Learn how IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
protecting data, ibm security, guardium, cloud enviornments, hybrid cloud enviornment
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
identities, manage identities, manage application access, application access
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
security identity governance, access governance
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
This IDaaS checklist will help you determine whether IBM Cloud Identity Service is right for you. Chances are - it is!
Tags : 
idaas, ibm cloud identity service, security
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : 
access management, integrated platform, cloud security, enterprise security, data security
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Oracle     Published Date: Oct 20, 2017
For the past several years IBM has been divesting its hardware business. At the same time, Oracle has continued to invest in IT infrastructure and cloud innovation. Oracle SPARC servers offer you greater performance and efficiency compared to IBM Power systems, with additional security and lower costs, along with the flexibility to run your applications on-premises or in the Oracle Cloud. Download this whitepaper to completely understand the value of the Oracle SPARC and the 5 reasons to choose Oracle SPARC over IBM Power.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.