landscape

Results 451 - 475 of 929Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure, data center
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
New competitors, new technologies and new expectations created by ubiquitous mobile connectivity are dramatically reshaping—and disrupting—the retail and consumer products landscape. To keep up, retailers and consumer products manufacturers need to understand their customers better than ever before.
Tags : 
ibm, consumer products landscape, consumer products manufacturers, big data, retailers
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security, big data, it security, data center, enterprise networks, it management, data management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security, endpoint solution, malware, advanced persistent threats, cybercriminal, business technology
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, threat, ciso, enterprise, security, data, business technology
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner, networking, business technology
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
Read this whitepaper to see how cogntive technologies are transforming the wealth management landscape.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, it career advancement, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis
    
IBM
Published By: IBM     Published Date: Jan 20, 2016
To succeed in the digital era, you have to be totally in sync with the behavior and preferences of your customers in a fast-changing landscape. You have to be quick and adaptable.
Tags : 
ibm, cmo, challenge, business, roi, business technology
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security, networking, business technology
    
IBM
Published By: IBM     Published Date: Mar 31, 2016
"Is ‘Integration’ becoming a barrier to cloud adoption and preventing you from getting there fast? With Cloud adoption gaining momentum, the diversity as well as complexity of cloud integration use cases is on the rise. The right integration strategy is the single most important determinant of success. IBM’s leading cloud integration offering—IBM Cast Iron—is constantly evolving to address the changing cloud landscape. Cast Iron has been an integration platform of choice for enterprises of all sizes, across different industry verticals. Its simple configuration-based ‘no coding’ approach and extensive pre-built connectors and templates make it suitable for emerging bi-modal IT teams. Cast Iron supports the complete spectrum of Cloud Integration use cases—from data migration to bi-directional sync, from API centric invocation style to eventbased integrations. Join us to learn the newer platform features and enhancements and how IBM Cast Iron can help you embrace cloud, paving the way fo
Tags : 
ibm, cloud integration, websphere, integration, ibm cast iron, middleware
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 15, 2016
This report examines the current state of self-service analytics across all industries and company sizes. It also highlights the technology decisions and analytical performance of organizations that reported high levels of self-service in their analytical use base.
Tags : 
ibm, analytics, self-service analytics, business analytics, analytical performance, business technology
    
IBM
Published By: IBM     Published Date: Apr 21, 2016
"Read this white paper for an overview of the B2B integration landscape—challenges, opportunities and leading strategies—and a summary of the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM cloud to: - Reduce TCO and internal resource requirements - Increase profitability and competitive differentiation - Accelerate B2B collaboration to achieve a competitive advantage"
Tags : 
ibm, b2b, cloud integration, collaboration, business technology
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
This report maps out the vendor landscape for social collaboration technologies, to help you understand where you need to start, and what you should be looking for in a vendor to maximize success with your initiative.
Tags : 
ibm, enterprise social solutions, enterprise solutions, mwd advisors, social collaboration, vendors, vendor offerings, social collaboration technology, business technology
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
In this webcast you will learn about: - The new dynamic and market landscape for talent - New imperatives and talent strategies for organizations - Lessons from best practice organizations
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This smartpaper presents an overview of the B2B integration landscape—its challenges, opportunities and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM cloud to excel amid escalating global complexity, demand volatility and new customer requirements.
Tags : 
ibm, b2b, b2b cloud integration, b2b integration, cloud, integration, smart paper, knowledge management, business technology, data center
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Today, all consumers can obtain any piece of data at any point in time. This experience represents a significant cultural shift: the beginning of the democratization of data. However, the data landscape is increasing in complexity, with diverse data types from myriad sources residing in a mix of environments: on-premises, in the cloud or both. How can you avoid data chaos?
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Today, all consumers can obtain any piece of data at any point in time. This experience represents a significant cultural shift: the beginning of the democratization of data. However, the data landscape is increasing in complexity, with diverse data types from myriad sources residing in a mix of environments: on-premises, in the cloud or both. How can you avoid data chaos?
Tags : 
data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations, market research, model management
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the world’s oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : 
energy, utilities, ibm, pov
    
IBM
Published By: IBM     Published Date: May 26, 2017
Digital transformation initiatives and the need for innovation are causing enterprises to rethink their IT landscapes including business-to-business (B2B) integration. Modern B2B integration is critical for enabling enterprises to achieve goals like increasing revenue, speeding up time to market, and improving efficiencies because these outcomes are dependent on having a successful business network. B2B practitioners have two goals — enable critical business initiatives and control costs — and cloud-based B2B services have been successful in helping enterprises achieve both goals. IDC interviewed eight IBM clients to understand how their use of IBM Sterling B2B Integration Services, part of the IBM B2B Cloud Services portfolio, has impacted their operations and businesses. Download now to learn more!
Tags : 
digital transformation, b2b integration, ibm, ibm b2b cloud services
    
IBM
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.