> Technology > Knowledge Management
 

Knowledge Management

Knowledge Management is an umbrella term for making more efficient use of the human knowledge that exists within an organization. The major focus of knowledge management is to identify and gather content from documents, reports and other sources and to be able to search that content for meaningful relationships.
Results 401 - 425 of 3072Sort Results By:Published Date | Title | Company Name

Combat the latest security attacks with global threat intelligence

White Paper Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security
    
IBM

IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

White Paper Published By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : 
ibm, ibm security network, ips gx7800, security, knowledge management
    
IBM

Network protection: The untold story

White Paper Published By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, network protection, ibm security network protection, network security, security
    
IBM

Key steps to securing data and maintaining proper access

White Paper Published By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : 
ibm, data security, risk management, data management, knowledge management
    
IBM

Protect your critical assets with identity governance

White Paper Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance
    
IBM

How Identity Governance became a key compliance and risk control

White Paper Published By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : 
ibm, identity governance, risk control, risk management, data security
    
IBM

The Case for Security Intelligence Services, Hosted from the Cloud

White Paper Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud, security
    
IBM

IBM QRadar Security Intelligence: Evidence of Value

White Paper Published By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, ponemon institute, ibm security qradar, siem, security
    
IBM

IT Executive Guide to Security Intelligence

White Paper Published By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management
    
IBM

2015 Cost of Data Breach Study: Global Analysis

White Paper Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, global, ponemon institute, knowledge management
    
IBM

2015 Cost of Data Breach Study: United States

White Paper Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : 
ibm, data breach, united states, ponemon institute, knowledge management
    
IBM

Enabling and Optimizing Hybrid IT Operations

White Paper Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, hybrid it operations, cloud, mss, managed security services
    
IBM

Enabling and Optimizing Hybrid IT Operations

White Paper Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, managed security services, hybrid it operations, security, knowledge management
    
IBM

2015 Cyber Security Intelligence Index

White Paper Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security
    
IBM

Four top cyber crime trends

White Paper Published By: IBM     Published Date: Apr 04, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, cybersecurity, ibm emergency response services, cyber crime trends, security
    
IBM

IBM 2016 C-suite Study

White Paper Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management
    
IBM

Integrated Threat Protection System for Dummies, 1st Edition

White Paper Published By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management, security
    
IBM

IBM X-Force Threat Intelligence Quarterly - 3Q 2015

White Paper Published By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM

IBM X-Force Threat Intelligence Quarterly - 4Q 2015

White Paper Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM

Making a business case for fraud-prevention technology

White Paper Published By: IBM     Published Date: Apr 04, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud loss reduction, fraud management, fraud prevention, security
    
IBM

Staying ahead of threats with global threat intelligence and automated protection

White Paper Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud
    
IBM

Fraud Protection Doesn't have to be an uphill battle

White Paper Published By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, fraud protection, fraud management fraud prevention, security, knowledge management
    
IBM

Enable Workplace Productivity

White Paper Published By: CDW     Published Date: Apr 04, 2016
The world is increasingly digital, with interactions and experiences delivered to a variety of users across a range of locations and devices. The modern workplace should follow users wherever they roam, deliver a superior experience, and drive productivity. Hewlett Packard Enterprise helps companies deliver rich digital and mobile experiences to users, including employees, customers, and guests, by extending their capabilities in app development, mobile connectivity, and collaboration.
Tags : 
productivity, best practices, business intelligence, business management, customer relationship management
    
CDW

Top Reasons Why VNX Unified Hybrid Flash

White Paper Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection
    
CDW

Empower the Data-Driven Organization

White Paper Published By: CDW     Published Date: Apr 04, 2016
Data proliferation can be both a source of business opportunity as well as a tremendous burden. With Hewlett Packard Enterprise’s broad portfolio and deep expertise, businesses can securely and easily harness their data to gain actionable insights, create and monetize new revenue streams, and enable continuous improvement of existing lines of business.
Tags : 
data management, business practices, data application, insights, business optimization
    
CDW
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End


Sub-Categories: Collaboration, Collaborative Commerce, Contact Management, Content Delivery, Content Integration, Content Management System, Corporate Portals, Customer Experience Management, Document Management, Information Management, Intranets, Messaging, Records Management, Search And Retrieval, Search Engines, Secure Content Management, SLA

Search      

Add Research

Get your company's research in the hands of targeted business professionals.