RecruitingBlogscom

Follow Us:

 

ibm security

Results 76 - 100 of 420Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Midsized companies now have a way to automate regular backups-and restore data almost immediately.
Tags : 
backup, ibm, tivoli storage manager fastback, restore data, it management, data security
    
IBM
Published By: IBM     Published Date: Oct 22, 2009
What is it? Why do I need it? And how does it work?
Tags : 
lotus, ibm, web content management, really simple syndication, rss, security, integration
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
The e-kit, "Collaboration solutions for a more flexible work environment," includes white papers, webcasts, a demo and more.
Tags : 
productivity, ibm, security, email, business applications platform, content managemaent, lotus
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
IBM Lotus® Sametime® software is an award- winning platform for realtime collaboration. For years, organizations of all types have taken advantage of the Lotus Sametime platform’s powerful, security-enhanced features, such as integrated presence awareness, instant messaging (IM), Web conferencing, voice and video, to help people quickly find, reach and collaborate with each other.
Tags : 
security-enhanced features, instant messaging (im), web conferencing, voice and video, sharepoint
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : 
ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
    
IBM
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption
    
IBM
Published By: IBM     Published Date: May 31, 2012
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.
Tags : 
ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business
    
IBM
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
Tags : 
ibm ouncelab, secure application, testing source code, data privacy, security, application configuration, encoding error
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
How to manage risk in outsourced applications.
Tags : 
ibm ouncelab, risk, outsourced application, outsourcing application development, security, source code, software risk analysis, audit
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security, data protection
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Learn how to you ensure that security standards are met as part of your quality measures.
Tags : 
ibm ouncelab, podcast, security software, secure software delivery, security
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.
Tags : 
ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security, recruitment & staffing, outsourcing & subcontracting, outsourcing, outsource, labor relations, it operations, human resources, human capital management
    
IBM Software
Published By: IBM Software     Published Date: Aug 09, 2010
The following are what we believe to be the top findings in this study. We organized these findings according to five major themes that emerged: perceived threats to sensitive and confidential information, responsibility and accountability, impact on the organization, perceived value of a data protection program, and perception gaps between CEOs and other C-level executives.
Tags : 
ibm ouncelab, data protection, c-level executive uk, compliance, roi, performance, privacy, data security, data protection
    
IBM Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top