White Papers: IBM


Sort by: Date | Company | Title


Ensuring Application Security in Mobile Device Environments
By IBM | 26/7/2013
As more employees prefer to use mobile devices in the workplace, organisations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team less control over devices that can access corporate networks. Read on to find out the best way to detect, analyse and eliminate application security vulnerabilities.
Download this now


Identity and Access Intelligence: Transforming the Nature of Enterprise Security
By IBM | 26/7/2013
Identity and access intelligence is not only reshaping the nature of defence against a wide range of threats. It is equipping businesses with the insight they need to understand the changes transforming IT and embrace them in a secure manner. In this paper, we describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Download now.
Download this now


Avoiding Insider Threats to Enterprise Security
By IBM | 26/7/2013
Today’s organisations are highly vulnerable to security threats related to privileged identities — that is, the accounts of system administrators, database managers and others with elevated access to critical IT resources. Because of the overarching access of these users, their privileged identities have extraordinary abilities to control and exploit an organization’s data, applications and endpoints. Find out more on how to protect privileged user identities across complex IT environments, even in the cloud.
Download this now


Hannigan's Approach to Advanced Persistent Threats
By IBM | 25/7/2013
In this video interview Brendan Hannigan, GM IBM Security Systems, talks about how the threat landscape is intensifying and what he is doing to address this challenge. Watch it now.
Download this now


Truth Behind the Trends
By IBM | 25/7/2013
In any given year, a few topics dominate the IT conversation. Fuelled by vendors, analysts and the media, this year attention is firmly focused on trends in mobility, cloud and security. In this whitepaper, we look at the growing trends in IT and the reality for Australian organisations in 2013. Click to download!
Download this now


IT Executive Guide to Security Intelligence
By IBM | 25/7/2013
Security intelligence, built upon the same concepts that have made business intelligence an essential enterprise technology, is the critical next step for organizations that recognize the importance of information security to their business health. In this white paper, we discuss how security intelligence address these shortcomings and empower organisations, from Fortune Five companies and mid-size enterprises to government agencies, to maintain comprehensive and cost-effective information security. Read now.
Download this now


2012 Mid-Year Trend and Risk Report
By IBM | 25/7/2013
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!
Download this now


Leading Through Connections – Insights from the Global Chief Executive Officer Study
By IBM | 17/10/2012
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.
Download this now


The Evolution of Business Resiliency Management
By IBM | 2/7/2012
Business resilience management is the holistic management of the processes to help identify potential risks based on impacts that threaten an organisation. One of the most critical aspects of achieving business resilience, a strong BRM program, can help enable organisations to more rapidly adapt and respond to risks and opportunities in order to maintain continuous business operations, be a more trusted partner and enable growth. Read more.
Download this now


Leveraging the cloud for business resilience
By IBM | 2/7/2012
To increase the competitiveness of their organisations, a growing number of IT leaders are making cloud computing a key component of their business strategy. They are increasingly relying on the cloud for applications like development and test—and finding that it’s a scalable, flexible and cost-effective solution. Read more.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?