wi fi security

Results 426 - 450 of 790Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : 
ibm, identity governance, risk control, risk management, data security
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : 
ibm, big data, data security, risk management
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
    
IBM
Published By: IBM     Published Date: May 13, 2016
The problem with good mobile experiences? They’re not great. The financial upside of delivering a great mobile app experience Key topics covered: • What makes for a great app (most companies get it wrong) • Four ways great apps outperform good apps • Tips for getting to great • How First Security Insurance is moving to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, forrester
    
IBM
Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : 
ibm, data, security, big data
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM
Published By: IBM     Published Date: Apr 23, 2018
Evaluate cloud-based IAM vendors with these five questions about their capabilities, solution, security expertise, pricing and staying power
Tags : 
cloud iam, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
    
IBM
Published By: IBM APAC     Published Date: Mar 06, 2019
Achieve superior control and performance across multicloud environments with IBM Multicloud Manager. With a multicloud strategy, it can become time-consuming, expensive and difficult to manage environments as you contend with scattered visibility, security and workloads across multiple Kubernetes clusters and clouds. IBM Multicloud Manager integrates all your environments in a single view that gives you optimal control over how you see, govern and automate everything.
Tags : 
    
IBM APAC
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.