- Secure Cloud Networking
- Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
- No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers
- The Hybrid Cloud Helps Midsize Companies Compete - Gaining Large Corporation Advantages at a Midsize Price
- The Anywhere, Anytime College Experience
June 2013- Every day, the world creates 2.5 quintillion bytes of data. Enterprises know that this data holds valuable information - but extracting meaningful insights out of all the noise can be quite a challenge. In order to capitalize on their big data, companies must successfully deal with the "four V's:" variety, volume, velocity and veracity. Fortunately, enterprise-class data governance and data integration tools, like IBM InfoSphere Information Server, can help organizations overcome the challenges of big data ...
May 2013- The explosive increase in cyberthreats poses an increasingly daunting challenge to the confidentiality, integrity, and availability of intellectual property and other sensitive information. Conflicting opinions about operational risk, myriad point solutions for security technology, and dissimilar computing infrastructures create a puzzling landscape for security and risk professionals. To assess the market, Forrester Consulting interviewed 225 IT security leaders across North America and Western Europe about their firm?s information security investments. Roughly 60% of respondents reported revenues ...
May 2013- This paper discusses the eight essential best practices that provide a holistic approach to safeguarding databases as well as the array of enterprise data sources across the organization while achieving compliance with key regulations such as SOX, PCI DSS, GLBA, HIPAA and data protection laws.
May 2013- This paper looks at this problem by first defining what enterprise information security and privacy involves, then looking at requirements that need to be met before introducing big data and identifying what impact this has on those requirements. It then takes a look of it at what one vendor, IBM, is offering in the area of big data and what it is trying to do to help customers bring big data technologies on board while ...
March 2013- Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies is inevitable. By deploying memory-based solutions for distributed database monitoring, enterprises will find that it is not only possible to protect sensitive information in these emerging computing models, but that the same architecture also provides both ...
March 2013- A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for sales and business development to overcome. That's why data security in general and database security in particular are a crucial part of any company's overall ...
March 2013- The Protecting Sensitive Data In and Around an IBM DB2 Database technical white paper provides an overview of the sensitive files in and around the IBM DB2 database that enterprises need to secure to achieve optimal database security.
March 2013- The Protecting Sensitive Data In and Around an Oracle Database technical white paper provides an overview of the sensitive files in and around the Oracle database that enterprises need to secure in order to achieve optimal database security.
March 2013- The Protecting Sensitive Data In and Around a SQL Server Database technical white paper provides an overview of the sensitive files in and around the Microsoft SQL Server database that enterprises need to secure in order to achieve optimal database security.
February 2013- Optimization and consolidation can make a big difference in the business value your data centers deliver. This paper examines the techniques and results of IBM's own internal data center transformation?and how you can apply this learning to your transformation efforts to achieve greater productivity, mobility and responsiveness.
How enterprise-wide master data management helped five financial services firms get a better view of their customers and of their risk.
At many large financial firms, information that is accessible in one application isn't available in the others. Those data 'silos' make the organizations inefficient, prevent them from taking advantage of business opportunities, lead to poor decision making and can complicate compliance. Adopting an enterprise-wide data management solution can lead to more successful ...
Many of the largest IT budget problems can be traced back to five big money drains:
1. Storage expansion
2. System complexity
3. Hardware sprawl
4. The Need for High Availability
5. Over or under-provisioning
If any of this sounds familiar, you're not alone. This e-book, provided by IBM, will introduce you to the five big IT budget killers - and some of the best ways to knock them out.
November 2012- Master data is a collection of data objects defined uniformly across organizational processes, enabling consistency and accuracy by serving as the single source. This document helps you to initially think about how master data plays an important role in your company and what to do to start maximizing its use for business value.
Securing Enterprise Data and Ensuring Compliance In the Face of Multiple Threats, Strategies Must be Comprehensive
Security is an important element of an information integration and governance framework. This research perspective by Ventana Research provides insight to help organizations ensure a centralized, holistic security architecture to prevent breaches and automate compliance.
November 2012- In nearly every industry, executives, managers and employees are increasingly using maps in conjunction with enterprise applications such as business intelligence (BI) and CRM. Companies seek every opportunity to gain an edge, and often it's to be found in the data at their fingertips. Approximately 80% of an organization's data has a location component. By ignoring or underutilizing this data, organizations overlook rich and pervasive information that could help them operate more efficiently and competitively. Savvy ...
Security is one of the top concerns facing an enterprise moving data to the cloud. This case study, published by analyst firm Gartner* details the lessons learned by a financial services early adopter of cloudbursting to Infrastructure-as-a-Service (IaaS).
*Case Study: Securing the Cloud by John Pescatore, Gartner, Inc. May 3, 2012
It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue.
On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage ...
As a federal IT professional, you see the rapid rate at which applications servers are being virtualized. So how can you keep up with the demand and still ensure that the critical data your agency stores in those virtual machines can be easily recovered in the event of a disaster? The answer: A comprehensive backup software that meets five critical requirements.
See what they are in this white paper, 5 Key Attributes Backup Software ...
Client virtualization encapsulates a user's desktop including operating system, applications, data and personalization-and stores it in the data center, rather than on the end-point device.
This has several advantages. The desktop is stored and maintained centrally, so it's much easier to manage, maintain and support. It's not tied to a particular computer, so it can be accessed from different devices. And the end-point device stores neither desktop nor data, so the security danger ...
Business moves fast - which means that software development teams need to move even faster. The emergence of new software development models, such as the agile development process, has given organizations powerful tools for responding to events quickly and has helped organizations evolve through collaboration between self-organizing, cross-functional teams.
To make the most of agile processes, organizations need effective and efficient testing strategies - complete with processes for governing test data. However, many ...
August 2012- It is critical that an organization understands relationships between data, its business value and how to ensure long-term and accurate data access. Every process - defined or otherwise - within the organization creates information as the process is executed. An organization's information can be grouped into many small units of related data, often referred to as the complete business object. This white paper defines the complete business object as it applies to organizations and its ...
August 2012- Organizations are under more pressure than ever to deliver better business outcomes. They need new insights that can help sales and marketing generate more revenue, help the finance department reduce risk and help the entire organization lower costs. This 20 page, interactive eBook uses 5 customer scenarios to show how organizations are tackling real issues using IBM big data, warehousing & analytics solutions. Discover how you can take data and analytics beyond the warehouse, and picture yourself in ...
August 2012- Success of data warehousing projects depends upon having access to reliable, accurate data. In this research brief, Ventana Research details some of the costs of bad data as well as the benefits of delivering trusted information to a data warehouse. The authors also lay out the basic framework for how trusted information is generated and delivered.
August 2012- Information, an essential asset in virtually all organizations, requires careful attention and robust processes to ensure it can reliably support business decision-making. Information arising from multiple sources must be integrated and governed to ensure it is a trusted source and in compliance with internal policies and external regulations and legislature. The process of the integration and governance of information provides a framework that incorporates acquisition, organization, control and use of information to create and enhance ...
August 2012- Through eight in-depth customer interviews, Springboard Research examines DB2 SAP implementations across the Asia Pacific region. Some of the reasons Springboard cites for the customers' migration decisions from Oracle Database to DB2 include the strong IBM/SAP relationship, better query performance provided by DB2, and healthy levels of ROI and TCO when running SAP applications on DB2.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services