RecruitingBlogscom

Follow Us:

 

ibm security

Results 226 - 250 of 429Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 07, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, cyber crime, trend, threat, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, threat, endpoint, security, intelligence, qradar, research
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This study details how organizations achieve cost and risk reductions while increasing productivity and tactical efficiencies from implementing IBM Security Guardium
Tags : 
ibm, forrester, total economic impact, tei, security, data
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data, security, compliance, information
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Understand how attacks work- then deploy comprehensive, integrated solutions to fight each step malware takes.
Tags : 
ibm, networks, malware, risk, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, networks, threats, protection, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, cloud, security, threats, usage, application, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Be the “Yes Guy” in IT with IBM Cloud Security Enforcer and expand secure adoption of cloud apps in the enterprise.
Tags : 
ibm, cloud, apps, security, protection, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Accelerate Cloud Adoption and Safeguard the Business
Tags : 
ibm, cloud, security, enforcer, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection, intrusion prevention, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
How can your organization better prepare for a security incident?
Tags : 
ibm, cyber security, threats, precaution, detection, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations.
Tags : 
ibm, identity governance, compliance, risk control, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, gartner, security, managed security services, magic quadrant, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see.
Tags : 
ibm, security, endpoint, endpoint platform, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security, cyber threats, business technology
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security, networking, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, ciso, cloud, cloud security, saas, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments. "
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, mobile, mobility, mobile risk mitigation, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, mobile security, mobile security maturity, ismg, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security, security
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top