integrated

Results 926 - 950 of 1286Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 06, 2016
Increase productivity using IBM Sametime with integrated Polycom voice and video conferencing
Tags : 
human resources
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Understand how attacks work- then deploy comprehensive, integrated solutions to fight each step malware takes.
Tags : 
ibm, networks, malware, risk, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats.
Tags : 
ibm, threat, prevention, protection, system
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This is the data sheet for Integrated Multivendor Support.
Tags : 
ibm, integrated support, multivendor, storage, networking, hardware, support, roi
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, mobile, mobility, mobile risk mitigation, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.
Tags : 
ibm, data security, data security, ibm security gaurdium
    
IBM
Published By: IBM     Published Date: May 25, 2016
Securely unlock enterprise data and services for the digital economy with an integrated API foundation
Tags : 
ibm, api, connect, api connect, middleware, api foundation
    
IBM
Published By: IBM     Published Date: May 25, 2016
Management Strategies for a New Wave of Integrated Applications
Tags : 
ibm, middleware, connect, api, api economy, management strategies, integrated applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : 
security, technology, access management, security breaches
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : 
ibm, security, access management, access manager
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : 
ibm, security, access management, access manager, integrated access management
    
IBM
Published By: EMC     Published Date: Apr 16, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
integrated computer platforms, emc, esg, virtual, private cloud, infrastructure
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
integrated computer platforms, emc, esg, virtual, private cloud, infrastructure
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
integrated computer platforms, emc, esg, virtual, private cloud, infrastructure
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
integrated computer platforms, emc, esg, virtual, private cloud, infrastructure
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
integrated computer platforms, emc, esg, virtual, private cloud, infrastructure
    
EMC
Published By: Adobe     Published Date: May 25, 2017
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
    
Adobe
Published By: IBM     Published Date: May 25, 2017
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
marketing, ibm, digital experience, collaboration, customer experience
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Operational efficiency and cost savings. Datadriven business insights. Organizational agility and market differentiation. Enterprises in every industry are pursuing such gains, but they cannot be achieved with a fragmented, siloed technology infrastructure. Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are aking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.