All resources sponsored by:

IBM

1 - 25 of 3202 Matches
Addressing NIST and DOD Requirements for Mobile Device Management
sponsored by IBM
WHITE PAPER:Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as how to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 24 Apr 2015 | Published: 11 Nov 2014
Get This Now


Critical HR Features to Adopt
sponsored by IBM
EGUIDE:In this e-guide, unveil the top 5 best practices for implementing an HR analytics program. Additionally, gain insight on the advantages of moving in-house HR systems to the cloud.
Posted: 24 Apr 2015 | Published: 24 Apr 2015
Get This Now


Boost HR Systems to the Next Level
sponsored by IBM
EGUIDE:This solution spotlight highlights which HCM market trends you should be paying attention to. Inside, find expert tips on how to choose your next HR IT system, as well as key insight on the increasing popularity of including talent analytics to improve HR decision-making.
Posted: 24 Apr 2015 | Published: 24 Apr 2015
Get This Now


Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER:In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013
Get This Now


Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO:In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015
Get This Now


How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER:This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013
Get This Now


Taking Your Recruitment System Global
sponsored by IBM
WHITE PAPER:Many organizations want to take their recruiting systems global, but aren't sure how to go about it. This white paper provides fives steps to planning your global expansion project. Read on to get started by thinking through the project in a linear, interactive way to frame the tasks at hand and better understand your organization.
Posted: 22 Apr 2015 | Published: 31 Jan 2014
Get This Now


Building A Solid Compensation Foundation
sponsored by IBM
WHITE PAPER:Compensation is critical to a human capital management strategy. Read this white paper to learn how to put tools in place to help you develop a meaningful compensation strategy and program design. Ensure your ability to attract, retain, and develop key talent.
Posted: 22 Apr 2015 | Published: 30 Jun 2012
Get This Now


How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER:This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015
Get This Now


Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER:In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014
Get This Now


Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER:In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014
Get This Now


7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER:This white paper explores how to develp a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014
Get This Now


4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER:This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014
Get This Now


Hackers and Dating App Vulnerabilities - A Match Made in Heaven
sponsored by IBM
WHITE PAPER:This white paper outlines the 4 most dangerous data app vulnerabilities and offers steps to take for you and your users to mitigate risk.  Read on to learn more.
Posted: 21 Apr 2015 | Published: 11 Feb 2015
Get This Now


Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER:Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014
Get This Now


The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER:This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015
Get This Now


Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER:In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014
Get This Now


Data Breach Risk Calculator
sponsored by IBM
RESOURCE:This brief infographic details how to calculate the cost of a breach by using such factors as your location and your industry.  View now to learn the story behind the numbers.
Posted: 17 Apr 2015 | Published: 30 Dec 2014
Get This Now


Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER:In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015
Get This Now


Monitoring the Hybrid Cloud: Evolving to the CloudSOC
sponsored by IBM
WHITE PAPER:In this in-depth white paper, find tips for managing all aspects of cloud computing without sacrificing security monitoring.
Posted: 17 Apr 2015 | Published: 07 Jan 2015
Get This Now


Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER:In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014
Get This Now


One Solution to Automated and Accelerated Service Delivery
sponsored by IBM
RESOURCE:In this resource, learn about a potential solution that is designed to automate service delivery of clouds and is used by hundreds of customers to build private or hybrid clouds.
Posted: 14 Apr 2015 | Published: 17 Apr 2014
Get This Now


Access to the Cloud When and Where You Need It
sponsored by IBM
RESOURCE:This resource explains how you can achieve higher performance and undergo a seamless integration of bare metal servers and virtual servers with a fully-automated platform.
Posted: 14 Apr 2015 | Published: 14 Apr 2015
Get This Now


A Holistic Approach to Reduce Risk and Improve Mainframe Security
sponsored by IBM
EGUIDE:This extensive technical guide outlines the steps to take to closing mainframe vulnerability gaps. View now to avoid configuring an insecure security strategy.
Posted: 13 Apr 2015 | Published: 04 Dec 2014
Get This Now


IBM SmartCloud Analytics: Making the System Analyze Itself
sponsored by IBM
WHITE PAPER:This research report explains how IBM's SmartCloud Analytics environment can be used with other IBM operational analytics tools (monitoring and log analysis) to learn systems behaviors and identify potential problems.
Posted: 10 Apr 2015 | Published: 10 Apr 2015
Get This Now


1 - 25 of 3202 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement