Security IBM SupplierWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security IBM Supplier returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Endpoint Security
 •   Application Security
 •   Security Policies
 •   Authentication / Password Management
 •   Managed Security Services
 •   Content Delivery Networks/ Web Application Acceleration

Related Searches
 •   Audit Security
 •   Chart Security
 •   Desktop Security IBM Supplier
 •   On-Line Security
 •   Protocol Security IBM Supplier
 •   Security IBM Supplier Diagram
 •   Security IBM Supplier Expert
 •   Security IBM Supplier Reseller
 •   Security IBM Supplier System Software
 •   Technical Security IBM
Advertisement

ALL RESULTS
1 - 25 of 494 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics by IBM

July 07, 1967 - (Free Research)
Read this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond. 
(WHITE PAPER) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 01, 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Managing a Growing Threat: An Executive’s Guide to Web Application Security by IBM

December 17, 2007 - (Free Research)
Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more. 
(WHITE PAPER) READ ABSTRACT |

Decision Management Smarter Insurance Processes by IBM

July 07, 2011 - (Free Research)
With varying compliance demands, change is the mainstay of the insurance industry. There are constant alterations to underwriting, rating, claims processing, fraud detection and billing. Read this case study of the Traveler's implementation of a business rules management system to effectively improve all of their processes. 
(CASE STUDY) READ ABSTRACT |

Enabling Continuous Compliance Across the Enterprise by IBM

June 30, 2011 - (Free Research)
Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions. 
(WHITE PAPER) READ ABSTRACT |

Rewriting the rules of Patch Management by IBM

July 01, 2011 - (Free Research)
IBM Tivoli Endpoint Manager helps organizations automatically manage patches for multiple operating systems and applications across hundreds of thousands of endpoints regardless of location, connection type or status. 
(WHITE PAPER) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 03, 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

IBM Lotus Complete Collaboration Express Starter Pack by IBM

March 13, 2009 - (Free Research)
Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits. 
(DEMO) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 27, 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

The IBM Rational AppScan Lifecycle Solution by IBM

July 2008 - (Free Research)
IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges. 
(WHITE PAPER) READ ABSTRACT |

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

IBM Application Security Solutions Demo by IBM

December 2008 - (Free Research)
IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture. 
(DEMO)

The Ideal Blade Solution to Replace Your Rack Server: IBM BladeCenter JS12 Express Blade by IBM

September 2008 - (Free Research)
Read this article to learn how to simplify your traditional UNIX, IBM i and Linux rack-mount and tower setup with the IBM BladeCenter JS12 Express blade and BladeCenter S chassis. Discover how it delivers a complete integrated business system. 
(WHITE PAPER) READ ABSTRACT |

NAV CANADA Takes Advantage of IBM Rational AppScan Software to Address the Security and Compliance of Its Online Applications by Logicalis

December 2008 - (Free Research)
NAV CANADA helped enhance the security of its Web applications through best practices such as regular scanning and testing for vulnerabilities throughout the software development lifecycle. 
(CASE STUDY) READ ABSTRACT |

IBM and Red Hat: Security-Rich Collaboration and Messaging Platform by Red Hat and JBoss

IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative. 
(SOFTWARE PRODUCT)

Value Proposition for IBM Power Systems as Database Server in Midsize Companies - Cost Comparisons for Linux by IBM

September 2008 - (Free Research)
This ITG report shows the advantages of the IBM Power platform for Linux database serving in mid-sized companies. It will discuss the use of IBM Power servers for core database serving and give a number of reasons to consider the Power platform. 
(WHITE PAPER) READ ABSTRACT |

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX by Vision Solutions

May 2008 - (Free Research)
This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX. 
(PODCAST) READ ABSTRACT |

Trial download: IBM Rational AppScan by IBM

July 2008 - (Free Research)
Download this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities. 
(TRIAL SOFTWARE)

Take a Holistic Approach to Business Driven Security by IBM

December 2008 - (Free Research)
Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success. 
(WHITE PAPER)

IBM Tivoli Security User Compliance Management Demo by IBM

December 2008 - (Free Research)
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information. 
(DEMO)

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

PCI Compliance for IBM System i (AS/400) by PowerTech

August 2008 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Solution Sheet: IBM tiered storage management helps reduce costs and complexity by IBM

October 2006 - (Free Research)
IBM storage software provides powerful capabilities to manage information through its lifecycle and customers can align data value with storage costs and required service levels. 
(WHITE PAPER) READ ABSTRACT |

Develop Effective User Management to Demonstrate Compliance Efforts and Achieve Business Value by IBM

December 2008 - (Free Research)
Learn how IBM solutions can help organizations support compliance efforts and business requirements through user management solutions based on IBM Tivoli Identity Manager software and other IBM offerings. 
(WHITE PAPER) READ ABSTRACT |

IBM Optim Data Privacy Solution for SAP by IBM

October 2008 - (Free Research)
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 494 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts