risk management

Results 501 - 525 of 689Sort Results By: Published Date | Title | Company Name

Preventing security risks in real time

Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
    
IBM

Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

Published By: IBM     Published Date: Oct 10, 2013
First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments. Read this white paper, “Security intelligence can deliver value beyond expectations and needs to be prioritized” for an overview of market adoption of security-as-a-service.
Tags : 
security, security intelligence, security incident, event management, security-as-a-service, information security, risk, risk management
    
IBM

The Convergence Of Reputational Risk and IT Outsourcing

Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
    
IBM

Discovery Health Predictive analytics used to craft preventive programs that keep members healthier

Published By: IBM     Published Date: Feb 05, 2015
Discovery Health ... Predictive analytics used to craft preventive programs that keep members healthier and costs lower.
Tags : 
predictive analytics, preventive programs, predictive risk management, clinical risk models
    
IBM

Pushing the frontiers - CFO insights from the Global C-suite Study 2013

Published By: IBM     Published Date: Jul 30, 2014
In this new CFO point of view report, we focus on the perspectives of the 576 CFOs we interviewed.
Tags : 
ibm, business analytics, business insights, cfo, cfo insights, managing risk, financial management
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, data protection
    
IBM

Breaking down silos of protection: An integrated approach to managing application security

Published By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : 
application deployment, point security, ibm, ibm security solutions, security, enterprise applications, data management
    
IBM

Big Data, Good Data, Bad Data-the link between information governance and Big Data outcomes

Published By: IBM     Published Date: Feb 24, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
big data, ibm, big data outcomes, information governance, big data analytics, it management, data management, data center
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management
    
IBM

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
IBM

Security essentials for CIO's enabling mobility - their device, your data

Published By: IBM     Published Date: Apr 09, 2015
IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.
Tags : 
ibm, security, risk management, mobile device security, network security appliance, security management, vulnerability management, mobile device management
    
IBM

Managing Security Risks and Vulnerabilities

Published By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : 
ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance
    
IBM

Fortifying for the Future: Insights from the 2014 IBM Chief Information Security Officer Assessment

Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security, networking, security, it management
    
IBM

Four steps to a proactive big data security and privacy strategy

Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
IBM

Three guiding principles for data security and compliance

Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
IBM

Combatting advanced threats with endpoint security intelligence

Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
IBM

Aligning IT With Strategic Business Goals- A Proactive Approach To Managing IT Risk To Your Business

Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions, security, it management, business technology
    
IBM

Transitioning Business Resiliency To The Cloud

Published By: IBM     Published Date: Oct 06, 2015
How do you successfully transition business continuity to the cloud? Read the white paper to learn how an end-to-end, scalable solution can help you plan and execute an enterprise-wide continuity and resiliency strategy. As a result, you will be able to help improve risk management, reduce costs, facilitate resilient service delivery and respond to changes more quickly..
Tags : 
ibm, cloud, resiliency strategy, risk management, resilient service delivery, service delivery, service delivery solutions, security
    
IBM

Understanding the risks of content management systems

Published By: IBM     Published Date: Oct 13, 2015
How open source web platforms can open your organization to attack. This paper reviews security concerns with content management systems (CMS), CMS attack metrics, and how organizations can protect websites built on a CMS platform
Tags : 
ibm, content management system, cms, platform, software development, enterprise applications, platforms, data management
    
IBM

Managing source code and unifying development teams: Mainframe DevOps for SCM today

Published By: IBM     Published Date: Apr 01, 2016
Discover how to break down IT silos and increase agility for globally and technically diverse teams by using a DevOps approach with an open, unifying platform for z/OS mainframes. Find out how enterprises reduce cost and risk for source code management (SCM) strategy.
Tags : 
ibm, devops, z systems, scm, source code, it management, business technology
    
IBM

Combatting advanced threats with endpoint security intelligence

Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security, knowledge management, enterprise applications
    
IBM

The endpoint platform for organizations of every size

Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
    
IBM

Key steps to securing data and maintaining proper access

Published By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : 
ibm, data security, risk management, data management, knowledge management, enterprise applications, network security
    
IBM

Protect your critical assets with identity governance

Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications
    
IBM

How Identity Governance became a key compliance and risk control

Published By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : 
ibm, identity governance, risk control, risk management, data security, security, knowledge management, enterprise applications
    
IBM
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.