ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:IBM

  • The case for security intelligence services, hosted from the cloud

    Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.

  • Met Office Makes a Cost-Conscious and Test-Driven Decision to Consolidate Linux Instances on the Mainframe

    See how a weather modeling and climate change research organization moved from a distributed mainframe model to a single system. In doing so, they were able to save a great deal of money and simplify their system from 206 x86 processor cores to 17 System z IFLs.

  • CISOs' Guide to Enabling a Cloud Security Strategy

    Discover how a focus on SaaS can benefit an enterprise's cloud security model. Learn why security professionals should embrace the move to the cloud and look for ways to align their security models with this new reality.

  • 2016 Cyber Security Intelligence Index

    This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.

  • Trends in SAP Cybersecurity

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Level Up with LinuxOne

    Discover a DC asset that provides improved performance and security over other tools, while scaling simply and affordably.

  • ESG Video Interview: Virtualization-Driven Data Protection Modernization

    ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.

  • Magic Quadrant for Security Information and Event Management

    The need for early targeted attack detection and response is driving the expansion of new and existing security information and event management deployments. This report by Gartner examines and compares the top vendors who market and sell SIEM products. Find out the strengths and weaknesses of each vendor so that you can better navigate the market.

  • Gartner 2016 Magic Quadrant for Identity Governance and Administration

    This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For better access governance, look beyond roles to entitlements

    Learn how to better enforce segregation-of-duties policies to ensure that currently authorized users don't have conflicting entitlements. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don't retain access after they leave the organization.

  • Advance Your Storage Performance with Cost-Effective Flash Solutions

    Discover a family of all-flash storage systems that provide efficiency, flexibility, and high-performance storage for any type of workload at an affordable cost. Not only can your enterprise meet demanding data storage requirements with this solution, but also improve your business agility, optimize your data economics, and more.

  • Simplified Data Protection for the Modern Enterprise: An Expert Evaluation

    Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.

  • Tolly evaluation: IBM Security Access Manager

    In this white paper, Tolly evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Embrace a Truly Customer-Centric Approach Through Flexible, Tailored Cloud Services

    Access this case study to discover how, like Sigmax, to deliver a new range of cloud services that can be precisely tailored to individual customer needs. Learn how a complete, converged infrastructure can drive operational efficiency through higher resource utilization, and more.

  • Case Study: Delivering Reliability and Cost Savings to Cloud Customers

    This case study discusses how a managed services provider focusses on 3 ways to help businesses in the UK improve their profitability. All through the use of mainframe computing.

  • KuppingerCole Leadership Compass: Access Management and Federation

    Streamlined access management technology is readily available today. Before you make any investments, however, take a look at this extensive white paper. Learn about the leaders in web access management today from the perspective of IT experts.

  • The Power of Modern Access Management Tools

    Find out how you can take back control of access management with an integrated platform for web, mobile & cloud in this white paper.

  • Defeating Server Sprawl

    This short video shows how you can get more out of your data by consolidating onto one platform in order to achieve myriad benefits, including cost savings.

  • Take Back Control of Access Management

    Discover how an integrated approach to access management can reduce complexity and thwart security breaches. Find out the myriad benefits all-in-one access management technology can offer.

  • Modernizing Data Protection

    Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.

  • Clearing the Confusion of Modern Data Protection

    One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.

  • POWER8: A Processor to Challenge Intel's Dominance

    Outlined in this paper are 6 considerations for IT organizations making a case for transition to the POWER8 processor, designed to be installed in file and print servers for key, high performing workloads. Read on to take advantage of POWER8 to fuel high value analytics and IT's cloud expansion.

  • Infrastructure Matters: POWER8 vs. Xeon x86

    Examine in this paper the key differences between two processing architectures: POWER8 vs Xeon x86. Read on to discover if this new generation of POWER8 processor-based servers are more efficient than x86 based systems and deliver faster computing results.

  • Economic Validation: Quantifying the Value of VersaStack, a Converged Infrastructure Solution

    Read this report to help your IT organization outline the costs and benefits of leveraging converged infrastructure against traditional component-based data centers intended to support virtual environments, and key into the predicted annual TCO, ROI, and payback period for converged systems.

  • Employee Voice is the New Employee Engagement

    This brief video explores how to gather employee data and generate valuable insights quickly so that you can act on this information while it's still relevant to your organization. Discover how to mitigate risks, address hot spots, and identify areas of opportunity in order to have a positive impact on the overall success of your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.