> Technology > Business Technology
 

Business Technology

Results 76 - 100 of 4246Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Jan 19, 2017
With organizations keeping larger and larger quantities of data the question will come up that given dropping storage costs, does uncontrolled data growth even matter? It does matter, and in this IBM publication featuring Gartner research you will learn about this ever growing problem and ways for information managers to address solutions.
Tags : 
ibm, analytics, data, ecm, big data
    
IBM
White Paper Published By: IBM     Published Date: Jan 19, 2017
The benefits of moving data to the cloud are touted everywhere, but doing so without an information governance plan in place can cause more problems than it solves. Information governance (IG) is increasingly cited as one of the top five initiatives for companies to tackle over the next two years.
Tags : 
ibm, analytics, ecm, information governance, cloud
    
IBM
Webinar Published By: IBM     Published Date: Jan 17, 2017
Watch to learn more about how cognitive content management from IBM will help you deliver just the right digital experience at just the right moment creating an iconic brand experience.
Tags : 
ibm, commerce, cognitive content management, brand experience, enterprise applications
    
IBM
Webinar Published By: IBM     Published Date: Jan 17, 2017
Forrester Research discusses shifts in creating customer-centric, content-rich digital experiences. IBM introduces the Watson Content Hub.
Tags : 
ibm, commerce, digital experience, customer experience, forrester
    
IBM
White Paper Published By: IBM     Published Date: Jan 17, 2017
IBM Commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly and seamlessly.
Tags : 
ibm, commerce, forrester, digital experience, enterprise applications
    
IBM
White Paper Published By: IBM     Published Date: Jan 11, 2017
Download this eBook to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats - Why Cyber Threat Analysis is the most effective defensive strategy - How analysts benefit from the use of sophisticated data visualization to identify hidden threat relationships and patterns - Why shifting from attack prevention to mitigation is a more practical goal for commercial organizations
Tags : 
ibm, analytics, public sector, security, cyber threat
    
IBM
White Paper Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time.
Tags : 
ibm, security, big fix, advanced threats, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
ibm, security, identity governance and intelligence, identity governance, gdpr
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, security, managed security monitoring
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Cybersecurity issues are no longer limited to the IT department; instead, they threaten every aspect of the organization and pose a significant threat to ongoing business continuity and reputation.
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.
Tags : 
ibm, security, ponemon institute, technology, fraud
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, security, services operations, ibm emergency response services, cybersecurity
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs, enterprise applications
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : 
ibm, security, ibm x-force, threat intelligence, enterprise applications
    
IBM
White Paper Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. These backup appliances have many if not all of the features needed to protect both physical and virtual environments and will give you visibility into the new set of features that will define the next generation of integrated backup appliances.
Tags : 
unitrends, integrated backup appliance, backup, recovery, it management
    
Unitrends
White Paper Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup
    
Unitrends
White Paper Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics, enterprise applications
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.