All resources sponsored by:

IBM

1 - 25 of 3256 Matches
The Secret to Deriving Intelligence from Unstructured Data
sponsored by IBM
EGUIDE:While there's value locked inside unstructured nonrepetitive data, it must be transformed before it can be understood and analyzed. This expert e-guide explores the challenges that prevent companies from easily structuring unstructured text. Learn how textual disambiguation can help you discover the context and infrastructure embedded within data.
Posted: 28 Apr 2016 | Published: 25 Apr 2016
Get This Now


Best Practices for Managing Unstructured Data
sponsored by IBM
EGUIDE:It can be difficult to extract value out of unstructured data, and even structured data often uses inconsistent languages and business definitions. This expert e-guide provides best practices for managing unstructured data. Discover crucial tips to help you add structure to unstructured data, combine structured and unstructured data, and more.
Posted: 28 Apr 2016 | Published: 25 Apr 2016
Get This Now


KeyBank Eliminates Geographical Boundaries, Improves Efficiency
sponsored by IBM
WHITE PAPER:In this case study, you'll learn how the right BPM and ECM strategy significantly decreases the amount of time needed to roll out new processes. Access now to learn how one organization achieved this along with efficiency gains and productivity improvements.
Posted: 28 Apr 2016 | Published: 28 Apr 2016
Get This Now


Simple is STILL Better: Embrace Speed & Simplicity for a Competitive Edge
sponsored by IBM
WHITE PAPER:This white paper provides insight into what modern data warehouses need to accomplish to be relevant. Learn how adapting old technologies to manage new challenges is inadequate, and how you can manage big data simply and at low cost, while simultaneously processing advanced analytics at the speed of business.
Posted: 28 Apr 2016 | Published: 31 May 2014
Get This Now


Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER:This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016
Get This Now


Lustratus Research: Competitive Review of BPM in the Cloud
sponsored by IBM
WHITE PAPER:Each of the four vendors in this independent assessment provide BPM Platform as a Service (PaaS) offerings to deliver BPM capabilities in the cloud. Compare IBM vs. Appian vs. Pegasystems vs. OpenText. Discover four use cases for BPM PaaS and how they apply to you.
Posted: 27 Apr 2016 | Published: 27 Apr 2016
Get This Now


Millennials Are Demanding a New Way to Work
sponsored by IBM
WHITE PAPER:Millennials are bringing consumer expectations for optimal user experiences into the workplace. This brief infographic explores the workplace priorities of millennials. Discover how this new generation of employees will influence enterprises in areas like remote working, leadership models, personalized analytics, and more.
Posted: 27 Apr 2016 | Published: 27 Apr 2016
Get This Now


Three guiding principles for data security and compliance
sponsored by IBM
WHITE PAPER:This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER:This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.
Posted: 26 Apr 2016 | Published: 01 Apr 2016
Get This Now


Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER:This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015
Get This Now


Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER:This white paper talks about steps you should take to best protect your virtualized cloud data.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


Arming the front line
sponsored by IBM
WHITE PAPER:This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015
Get This Now


How Employees of the Future Are Shaping the Workplace
sponsored by IBM
WHITE PAPER:By 2025, two-thirds of the workforce will be millennials, and this digitally literate generation will transform the workplace in innovative ways. Discover 5 ways millennials will shape the workplace in the near future. Learn how businesses can increase employee engagement, encourage motivation, identify future leaders, and more.
Posted: 26 Apr 2016 | Published: 26 Apr 2016
Get This Now


Fraud Protection Doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER:This white paper shows you how you may reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


Capture Documents to and from Box with Automatic Classification and Data Extraction to Streamline Business Processes
sponsored by IBM
WHITE PAPER:Access this brief white paper to learn about software that seamlessly integrates with Box and can provide you with benefits such as:• Document capture wherever they enter your organization whether it's in a regional office or on the road• Automated identification and classification of documents while they're captured• And more
Posted: 26 Apr 2016 | Published: 26 Apr 2016
Get This Now


Easily Access and Collaborate with Content from Box Directly within the Case Environment
sponsored by IBM
WHITE PAPER:In this short white paper, explore how IBM Case Manager can work in tandem with Box to provide a 360-degree view of all case-related content, analytics of content in context, and can serve as a platform for all content-related work.
Posted: 25 Apr 2016 | Published: 25 Apr 2016
Get This Now


IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER:This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015
Get This Now


2015 Frost & Sullivan Asia-Pacific Intrusion Detection & PreventionVendor of the Year - IBM
sponsored by IBM
WHITE PAPER:This white paper shows you how greatly IDS/IPS is growing in Asia Pacific are other methods they are using to stay ahead of advanced threats. Access now to improve your organization's awareness of these threats and prepare yourself against sophisticated threats in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015
Get This Now


Address Your Assessment and Cleanup, Migration, and Data Privacy Needs Before You Move to Box
sponsored by IBM
WHITE PAPER:In this brief white paper, learn how, as you move to Box, IBM StoredIQ can enable you to easily identify important content, ensuring data cleanup and migration, data privacy and protection, and more.
Posted: 25 Apr 2016 | Published: 25 Apr 2016
Get This Now


2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT:This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015
Get This Now


Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER:This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016
Get This Now


Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER:This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015
Get This Now


The Leaders' Guide to Insights: Why Enterprise Search Is No Longer Enough
sponsored by IBM
WHITE PAPER:Enterprise search often fails to deliver users the information they need at the right time, especially when they have to deal with hybrid cloud environments and unstructured data. Discover a search strategy that offers customization and personalization for employees, information security, hybrid cloud infrastructure support, and more.
Posted: 22 Apr 2016 | Published: 22 Apr 2016
Get This Now


10 Questions to Ask Your Vendor about File Gateway Consolidation
sponsored by IBM
RESOURCE:When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015
Get This Now


Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER:This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016
Get This Now


1 - 25 of 3256 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement