integrated

Results 976 - 1000 of 1367Sort Results By: Published Date | Title | Company Name
Published By: Pivot3     Published Date: Nov 01, 2017
I&O leaders desire more workload scaling from HCIS, but need more convincing. This Gartner research provides insight and guidance on adoption of this technology and its potential to handle more challenging workloads.
Tags : 
hyperconverged integrated systems, infrastructure systems, enterprise workloads, data center, hybrid cloud
    
Pivot3
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : 
tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert
    
Tripwire
Published By: IBM     Published Date: May 02, 2014
These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse.
Tags : 
ibm, big data platform, architecting big data, analytics, intelligent business strategies, data complexity, data types, workload growth
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
mobility, mobile risk, security, mitigation
    
IBM
Published By: IBM     Published Date: Sep 08, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers. You'll learn: What it takes to uncover hidden trends and explore relationships across disparate data sources using natural language queries Ways to use in-depth insight to create highly relevant campaigns and content that's aligned with individual customer behaviors and preferences How to take product recommendations to new levels of accuracy with pinpoint prediction and targeting
Tags : 
ibm, ecommerce, b2c, b2c ecommerce, commerce, data, business advisor
    
IBM
Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM
Published By: IBM     Published Date: Nov 22, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
commercial payment center, payments infrastructures, business agility, integrated transaction management
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: IBM     Published Date: Aug 05, 2014
IBM® InfoSphere® Master Data Management (MDM) helps organizations gain a comprehensive and accurate 360-degree view of their customers. This 360-degree view, when integrated with a CRM solution such as Salesforce.com, helps organizations improve the effectiveness of their CRM initiatives to help companies: -Increase user productivity -Improve sales and marketing performance to increase win rate and revenue -Mitigate risks associated with poor customer data Download here to learn more!
Tags : 
ibm, salesforce, mdm, crm, initiatives, data
    
IBM
Published By: IBM     Published Date: Oct 01, 2014
Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies on. This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources. This data is integrated seamlessly within Salesforce.com to help your sales teams get a complete view of the customer to help find the right contacts, allocate resources efficiently and identify new opportunities. This helps your sales teams be more efficient, effective and ultimately improve your win rate and drive more revenue.
Tags : 
salesforce, crm solution, data integration
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
payments infrastructures, transaction management, payment transformation, single payments platform
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, threat protection system, automated response capabilities, it security practices
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : 
application deployment, point security, ibm, ibm security solutions
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : 
ibm, integrated security, security weakness, risk management, infrastructure security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.
Tags : 
malware protection, ibm, network security, it security, application security
    
IBM
Published By: IBM     Published Date: May 29, 2015
The Internet of Things is the Internet of the future, powering billions of integrated devices and processes across industries and global locations.
Tags : 
communication, interconnecting, internet, mobile, integration, networks, supply chain management, scalability
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions
    
IBM
Start   Previous    33 34 35 36 37 38 39 40 41 42 43 44 45 46 47    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.