RSS feed Get our RSS feed

News by Topic

format type

Results 26 - 50 of 89Sort Results By: Published Date | Title | Company Name
By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
     Forcepoint
By: Group M_IBM Q119     Published Date: Dec 20, 2018
Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
The days of data being narrowly defined as highly structured information from a few specific sources is long gone. Replacing that notion is the reality of a wide variety of data types coming from multiple sources, internal and external, to an organization. All of it is in service of providing everyone from IT, to line-of-business (LOB) employees, to C-level executives with insights that can have an immediate and transformative impact.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Sophisticated banking requires sophisticated computing systems. But which systems offer the greatest chance for success? Many banks are discovering that the answer can be found within their on-premise data centers – the mainframe computer. Mainframes have become a modern platform for innovation. When operating in a hybrid cloud environment, mainframes provide cost flexibility, scalability, agility, sophistication and unmatched security. And they support innovation, business transformation and new types of monetization. The power of mainframe computing is being rediscovered. Specifically, in a recent 2017 survey of banking executives, we found that: • 50 percent said they believe hybrid cloud – and the systems that underpin it – can significantly lower the cost of IT ownership • 47 percent said they believe mainframe enabled hybrid cloud can improve operating margin • 47 percent said they believe dual-platform hybrid cloud can accelerate innovation. While innovation and improved p
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
     Hewlett Packard  Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
     Hewlett Packard Enterprise
By: HireVue     Published Date: Mar 05, 2019
The AI-in-recruiting space has exploded, leaving many recruiting leaders feeling overwhelmed and poorly qualified to evaluate vendors. Our AI Buying Guide is designed to help TA leaders cut through the hype and misinformation that surrounds artificial intelligence, and make highly qualified, informed buying decisions. YOU’LL LEARN: • What AI is, and what makes it different from previous technological innovations • Why different types of organizations see different levels of success with AI - and how to prep yours to maximize the impact • How to evaluate vendors across the 3 steps of the buying process • How to build a rock-solid business case for AI-driven recruiting technology Download the guide now.
Tags : 
     HireVue
By: Hitachi Vantara     Published Date: Mar 21, 2018
Regardless of where you are on the path to transformation, get there faster with Hitachi Vantara - the only company with advanced data services for every type of data, from any application, on any vendor’s solution and for any need. Together, Hitachi Vantara helps you unlock insights in your data, to ensure you’re ready for what's next in digital transformation.
Tags : 
     Hitachi Vantara
By: Hitachi Vantara     Published Date: Apr 11, 2018
Regardless of where you are on the path to transformation, get there faster with Hitachi Vantara - the only company with advanced data services for every type of data, from any application, on any vendor’s solution and for any need. Together, Hitachi Vantara helps you unlock insights in your data, to ensure you’re ready for what's next in digital transformation.
Tags : 
     Hitachi Vantara
By: Hitachi Vantara     Published Date: Apr 12, 2018
Regardless of Where You Are on the Path to Transformation – Get There Faster With Hitachi Hitachi Vantara is the only data company with advanced data services for every type of data, from any application, on any vendor’s solution and for any need. Partner With Hitachi To Master Your Digital Transformation.
Tags : 
     Hitachi Vantara
By: Hitachi Vantara     Published Date: Apr 12, 2018
Not applications. Not infrastructure. Data. Innovate faster with data services from Hitachi Vantara. Regardless of Where You Are on the Path to Transformation – Get There Faster With Hitachi Hitachi Vantara is the only data company with advanced data services for every type of data, from any application, on any vendor’s solution and for any need. Partner With Hitachi To Master Your Digital Transformation.
Tags : 
     Hitachi Vantara
By: IBM     Published Date: May 30, 2008
Not all data is created equal, however, and deriving business value from information dispersed over many different sources means integrating, analyzing and optimizing heterogeneous types and sources of information throughout its lifecycle. Find out how, when deployed together in the same environment, IBM TotalStorage Productivity Center, IBM System Storage SAN Volume Controller and IBM Tivoli Storage Manager deliver the core technologies need to help customers tier their storage based on classes of service.
Tags : information lifecycle, information management, tivoli, storage management, leveraging information, ibm, ibm li, li campaign
     IBM
By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
     IBM
By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : disaster recovery operations, cloud technologies, cloud computing, critical business aplplications
     IBM
By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : finance, cyber crime, banking, security, network security, fraud prevention
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
By: IBM     Published Date: Jul 08, 2015
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as ETL, ELT (also known as ETL Pushdown), data replication or data virtualization. Read this new whitepaper to learn about the seven essential elements needed to achieve the highest performance.
Tags : 
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : data integration, data security, data optimization, data virtualization, database security
     IBM
By: IBM     Published Date: Apr 18, 2017
The data integration tool market was worth approximately $2.8 billion in constant currency at the end of 2015, an increase of 10.5% from the end of 2014. The discipline of data integration comprises the practices, architectural techniques and tools that ingest, transform, combine and provision data across the spectrum of information types in the enterprise and beyond — to meet the data consumption requirements of all applications and business processes. The biggest changes in the market from 2015 are the increased demand for data virtualization, the growing use of data integration tools to combine "data lakes" with existing integration solutions, and the overall expectation that data integration will become cloud- and on-premises-agnostic.
Tags : data integration, data security, data optimization, data virtualization, database security, data analytics, data innovation
     IBM
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Apr 18, 2018
Driving changes Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : ibm, blockchain, mobility
     IBM
By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : data analytics, data storytelling, business intelligence
     IBM
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics