ibm

Results 4026 - 4050 of 4210Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 02, 2015
2015 Global Cost of Data Breach Study. The gold standard benchmark from Ponemon Institute and IBM.
Tags : 
     IBM
By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : 
     IBM
By: IBM     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
     IBM
By: IBM     Published Date: Oct 12, 2015
Forrester worked with IBM to analyze the total economic impact that IBM Datacap has on an existing customer, who voiced these business challenges and objectives.
Tags : 
     IBM
By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : ibm, media, entertainment, analytics, digital
     IBM
By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : 
     IBM
By: IBM     Published Date: Nov 20, 2015
A survey based digital tool that gives a score on level of maturity
Tags : ibm, telecom, analytics, digital
     IBM
By: IBM     Published Date: Jan 06, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles.
Tags : recruitment, recruitment marketing, critical role recruiting, human resources, talent attraction
     IBM
By: IBM     Published Date: Jan 06, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start.
Tags : assessment anayltics, ibm, performance, quality, maximize
     IBM
By: IBM     Published Date: Jan 07, 2016
This paper outlines the challenge of insider threats - who they are, the damage and financial loss they can cause, and what organizations can do to protect themselves.
Tags : ibm, security, threat, insider threat
     IBM
By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : ibm, threat, trusteer apex, malware, application, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : ibm, credentials, threat, data, analysis, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : ibm, identity, access assurance, identity, security
     IBM
By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : ibm, security management, mainframe, cloud, information management, security
     IBM
By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cyber security, overview, threats, security
     IBM
By: IBM     Published Date: Jan 20, 2016
Hold for copy
Tags : ibm, c-suite, global study
     IBM
By: IBM     Published Date: Jan 21, 2016
IBM talent expert Andi Britt examines the modern pressures and challenges of human resource management and the opportunities that new technology presents for today’s CHROs.
Tags : ibm, chro, technology
     IBM
By: IBM     Published Date: Jan 20, 2016
CFOs must find new ways to drive enterprise agility, enhance decision-making and promote growth, all while ensuring traditional tasks run smoothly.
Tags : ibm, cfo, enterprise, agility
     IBM
By: IBM     Published Date: Feb 02, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market.
Tags : ibm, forrester, cloud, mobile application, delivery
     IBM
By: IBM     Published Date: Mar 25, 2016
test
Tags : 
     IBM
By: IBM     Published Date: Mar 25, 2016
test
Tags : 
     IBM
By: IBM     Published Date: Mar 31, 2016
"The market buzz around APIs has distorted executive's thought processes about how to make money from APIs. Our guest speaker, Forrester analyst Randy Heffner, will tell the real truth about how to drive value from APIs. Who Should Read/View This webcast: business audience Attend to also learn how to: Provide business users with real-time information for more informed decision making Leverage the latest cloud, mobile, and analytics enhancements in IIB v10 Use the IIB Healthcare Pack to accelerate development and deployment of integration solutions Who Should Attend this Webcast: business audience"
Tags : ibm, api, integration, application program interface, middleware
     IBM
By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : ibm, hybrid it operations, cloud, mss, managed security services
     IBM
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
Start   Previous    155 156 157 158 159 160 161 162 163 164 165 166 167 168 169    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com