information management

Results 426 - 450 of 654Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 04, 2014
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management, business analytics, business intelligence, content management system, document management, information management, search and retrieval
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
The e-Learning industry has grown tremendously since the early days of computers and the Internet. Today there are lots of products and services out in the market place from which to choose. This white paper will provide some basic information to help you as you begin your research into e-Learning and learning management systems. The document is not meant to be the complete source of information on e-Learning nor will these guidelines be suitable for every single situation. This white paper has been created as a learning aid help you get started. These findings represent the research, experience, and techniques gleaned from working in e-Learning since its infancy in the late 80’s to today. At the end of the paper, Bob Goldschneider, Director of Business Development at SyberWorks, Inc., will provide a summary and closing remarks.
Tags : 
syberworks, e-learning, internet, aicc, scorm, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: IBM     Published Date: Oct 01, 2014
Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next. The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, combined, trusted 360-degree view of all data related to customers, accounts, products and other entities. The combined solution enables organizations to gain a deeper understanding of customer sentiment, increase customer loyalty and satisfaction, and get the right information to the right people to provide customers what they need to solve problems, cross-sell and up-sell.
Tags : 
data integration, customer loyalty, customer service, big data, data management
    
IBM
Published By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : 
ibm, mobile, management, guide, app development, networking, it management, business technology, data center
    
IBM MaaS360
Published By: IBM     Published Date: Feb 24, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
big data, ibm, big data outcomes, information governance, big data analytics, it management, data management, data center
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Jul 14, 2015
This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
big data, data warehouse, data center, information governance, analytics, big data analytics, business management, data management
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies, it management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security, data, networking, wireless
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
In order to meet the changing demands of their customers, organizations need the right solution that can help them harness the vast amounts of customer data in ways that yield personalized, seamless customer experiences. That solution is IBM Watson Engagement Advisor.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, storage, business technology, data center
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
Read this whitepaper to see how cogntive technologies are transforming the wealth management landscape.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution.
Tags : 
ibm, qradar, security, intelligence, siem, information and event management
    
IBM
Published By: IBM     Published Date: Jan 13, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, data, infosphere, server, data warehousing, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, ponemon institute, ibm security qradar, siem, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
By using InfoSphere Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of-impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time.
Tags : 
ibm, big data, ibm infosphere, information empowerment, data integration, data management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem, networking, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
As the amount of information we generate grows, and as our relationship with information grows more complex, the race to innovate new products and services to help us harness information, manage it, and tap into it more easily intensifies. This paper discusses the continuing development of HP’s strategy for delivering Converged Storage that improves the ability of your business to capitalize on information. Building on the foundation provided by fusing industry-standard technologies, federated scale-out software, and converged management, HP is now extending Converged Storage into new solutions and segments with a new initiative that introduces the next evolution of this HP Converged Storage strategy and vision.
Tags : 
storage, converged storage, business technology
    
Hewlett-Packard
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
Businesses don’t garner insights or make decisions. Businesses don’t close deals, invent new products, or find new efficiencies. People do. Companies excel when they empower their people to drive the business forward. But to see results, you also have to give your people the right tools, information, and opportunities—because success ultimately comes down to your people.
Tags : 
microsoft, microsoft dynamics, productivity, people ready, people-ready, employee performance, business process automation, bpm, information management, information work, collaboration, corporate portal, dynamics ax, business integration
    
Microsoft Dynamics
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Incorp.
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee