romi

Results 351 - 375 of 778Sort Results By: Published Date | Title | Company Name

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM

Increase agility at the speed of disruption

Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business, enterprise applications, business technology
    
IBM

Extracting value from the Internet of Things

Published By: IBM     Published Date: Dec 05, 2016
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies.
Tags : 
ibm, watson, leadership, internet of things, iot, knowledge management, enterprise applications, business technology
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

OTT Success Series - Security Paper

Published By: IBM     Published Date: Mar 20, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : 
ott. security, ibm, content security, cloud, cloud migration
    
IBM

OTT Success Series - Security Paper

Published By: IBM     Published Date: Apr 10, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : 
ibm cloud video, premium content, cloud migration, security, content
    
IBM

Three Golden Rules For Safe And Sound Endpoints

Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM

Three Golden Rules For Safe And Sound Endpoints

Published By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM

The future of energy and utilities - An IBM POV

Published By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the world’s oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : 
energy, utilities, ibm, pov
    
IBM

Extracting Value from the Internet of Things

Published By: IBM     Published Date: May 31, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, iot technology, digital transformation
    
IBM

Extracting Value from the Internet of Things

Published By: IBM     Published Date: Jul 13, 2017
Leaders embracing the ioT are gaining new values, including accelerating innovation, enhancing operations, and improving engagement. Disruptors are utilizing the internet of things and recomposing their businesses by digital transformation. There are many different ways to unlock the potential of the internet of things. The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, innovation, enhancing operations, digital transformation, iot technologies
    
IBM

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

Guard Your Organization's Data with Intelligent IBM Encryption

Published By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM

Extracting Value from the Internet of Things

Published By: IBM     Published Date: Oct 18, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
internet, ibm, ibv, internet of things
    
IBM

Protect Users and Critical Data with Advanced Access Security

Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM

Database Security : KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
database, security, guardium, confidentiality
    
IBM

Database Security: KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM

Hitting the Wall with Server Infrastructure for Artificial Intelligence

Published By: IBM     Published Date: Jul 02, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
IBM

Information empowerment for your evolving data ecosystem

Published By: IBM     Published Date: Jul 05, 2018
Scalable data platforms such as Apache Hadoop offer unparalleled cost benefits and analytical opportunities. IBM helps fully leverage the scale and promise of Hadoop, enabling better results for critical projects and key analytics initiatives. The end-to- end information capabilities of IBM® Information Server let you better understand data and cleanse, monitor, transform and deliver it. IBM also helps bridge the gap between business and IT with improved collaboration. By using Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of- impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time. Since its inception, Information Server has been a massively parallel processing (MPP) platform able to support everything from small to very large data volumes to meet your requirements, regardless of complexity. Information Server can uniquely support th
Tags : 
    
IBM

2019 Annual IBM X-Force Threat Intelligence Index.

Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC

Does complexity impact your cybersecurity strategy?

Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: IBM APAC     Published Date: Sep 30, 2019
Companies that are undergoing a technology-enabled business strategy such as digital transformation urgently need modern infrastructure solutions. The solutions should be capable of supporting extreme performance and scalability, uncompromised data-serving capabilities and pervasive security and encryption. According to IDC, IBM’s LinuxONE combines the advantages of both commercial (IBM Z) and opensource (Linux)systems with security capabilities unmatched by any other offering and scalability for systems-of-record workloads. The report also adds LinuxONE will be a good fit for enterprises as well as managed and cloud service provider firms. Read more about the benefits of LinuxONE in this IDC Whitepaper.
Tags : 
    
IBM APAC
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.