X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 ibm security


IBM Announces IBM Security Intelligence with Big Data
IBM has announced IBM Security Intelligence with Big Data, an offering that combine big data analytics with security intelligence capabilities for addressing

ibm security  Announces IBM Security Intelligence with Big Data IBM has announced IBM Security Intelligence with Big Data , an offering that combine big data analytics with security intelligence capabilities for addressing both internal and external cyber security threats. The solution aims to provide a comprehensive offering for security analysts to extend their capabilities in detection and prevention. Made in IBM Labs, Security Intelligence with Big Data enables big data analysis with real-time correlation capabil

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » ibm security

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

ibm security  point. Compaq, HP, and IBM all want to sell servers, and without the confidence of a secure operating system, many organizations today who want a turnkey commercial off-the-shelf server solution are turning to vendors like Sun Microsystems and Novell. E-commerce is the prevailing internet market driver, and without security, financial transactions are a risk and a liability that smart businesses and organizations are not willing to take. Though the Alliance may be hedging towards putting more security in Read More

Security Innovation


Security Innovation has been identifying application security risks for top software vendors and US government agencies since its inception. The company offers security services from application testing, to security code review, to auditing. Security Innovation was founded by a recognized authority in software security and is managed by software industry veterans and a team of experts that came from companies like Microsoft, Lockheed Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT.

ibm security  Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT. Read More

Security in the Software Development Lifecycle


Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle.

ibm security  process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle. Read More

IBM Firewall Discontinued


IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.

ibm security  User Recommendations Just because IBM is waving the white flag when it comes to firewalls, don't underestimate the security capabilities of the AS/400. With integrated security throughout the hardware and operating system, the AS/400 provides among the best rock solid host security in existence today. When examining the alternatives to the AS/400, depending on what kind of technology approach you want to take, IBM recommends Checkpoint/Nokia Firewall-1, a Stateful Packet Inspection firewall; Axent's Read More

Malware Security Report: Protecting Your Business, Customers, and Bottom Line


Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line.

ibm security  Security Report: Protecting Your Business, Customers, and Bottom Line Malware is malicious software designed to attack and damage your business. Defining malware is simple, protecting against it is not. Malware can piggyback undetected in e-mails, instant messages, Web sites, and peer-to-peer connections—no organization is safe. But you can defend against malware attacks. Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line . You'll learn how cyber Read More

Internet Security and Acceleration Server


Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth resources.  

ibm security  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

ibm security  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More

IBM Marketing Performance Analytics


The IBM Marketing Performance Analytics solution helps marketing organizations and CMOs understand and justify performance by answering three critical questions: “how are we doing?”; “why?”; and “what should we be doing?”

ibm security  Marketing Performance Analytics The IBM Marketing Performance Analytics solution helps marketing organizations and CMOs understand and justify performance by answering three critical questions: “how are we doing?”; “why?”; and “what should we be doing?” Read More

IBM Emptoris v10, Smarter Commerce, and Strategic Sourcing


Emptoris has been part of IBM for about 20 months, and we’re coming up on the close of its first full fiscal year under the IBM label. Since the acquisition, IBM has been integrating Emptoris into its three-year-old Smarter Commerce conception (Emptoris was known to have had some 750 employees at the time of acquisition, but IBM will not disclose the number of employees now associated with it).

ibm security  has been part of IBM for about 20 months, and we’re coming up on the close of its first full fiscal year under the IBM label. Since the acquisition, IBM has been integrating Emptoris into its three-year-old Smarter Commerce conception (Emptoris was known to have had some 750 employees at the time of acquisition, but IBM will not disclose the number of employees now associated with it). This has included passing the reins from former CEO Patrick Quirk to longtime IBM Software Group veteran Roque Martin, Read More

Acumatica ERP is in IBM Cloud Too


Acumatica recently announced a partnership with IBM that brings Acumatica Cloud ERP to the IBM Cloud marketplace. With the Acumatica partnership, IBM clients can utilize the Acumatica Cloud ERP solution for their business management needs, hosted on the IBM Cloud.

ibm security  ERP is in IBM Cloud Too Acumatica recently announced a partnership with IBM that brings Acumatica Cloud ERP to the IBM Cloud marketplace. The IBM Cloud marketplace offers clients access to more than 100 software as a service (SaaS) applications, IBM’s Bluemix platform-as-a-service (PaaS), the SoftLayer infrastructure-as-a-service (IaaS), and IBM's intellectual capital and industry expertise. With the Acumatica partnership, IBM clients can utilize the Acumatica Cloud ERP solution for their Read More

Ernst & Young Leads Big 5 in Security


Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

ibm security  & Young Leads Big 5 in Security Ernst & Young Leads Big 5 in Security L. Taylor - May 19, 2000 Event Summary Announcing an upgrade to its online security portal, Ernst & Young is clearly out in front of the big five when it comes to security consulting services. Its newly expanded online portal, eSecurityOnline.Com, offers a multitude of resources including newsgroups, mailing lists, vulnerability and virus information, a listing of security service offerings, security training, a library, and much mo Read More

Fundamental Principles of Network Security


As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols.

ibm security  Principles of Network Security As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols. Read More

Aberdeen Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive!


This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read.

ibm security  Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive! This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read. Read More