Mainframe February 16, 2016 Three Things You Need to Know About Mainframes in the Cloud — and Why the z13s Rocks! 4 min read - IBM has announced the z13s, a secure, high-volume, transaction-designed rocket ship ready to help businesses enhance their transaction processing.
Mainframe November 24, 2015 What Are the Risks of Legacy Infrastructure? 2 min read - Using legacy infrastructure does more than drive up the costs of maintenance; it also hinders innovation and increases risks related to security.
Cloud Security October 22, 2015 Don’t Fly Blind in the Clouds: How Cognitive Security Aids Cloud Computing 4 min read - Cognitive security can make initiatives such as cloud computing safer, scalable and more manageable for enterprises of any size.
Identity & Access October 13, 2015 Who’s Watching the Front Door? 3 min read - A strong, centralized, intelligent access management solution can help slam the front door on attackers before they creep into enterprise networks.
Intelligence & Analytics April 21, 2015 Security Intelligence and the Cloud 3 min read - IBM has outlined a framework to help assess the most appropriate approach based on the cloud adoption strategy, maturity and security and compliance requirements.
Cloud Security April 14, 2015 The Grand Challenge for Cloud Security 2 min read - The flexibility and openness of the cloud has created a number of cloud security concerns in terms of the privacy, integrity and availability of data.
Cloud Security January 13, 2015 How IBM’s Patent Leadership Translates to the Future of Cloud Security 2 min read - Inventing new approaches and coming up with sophisticated innovations will be key for organizations looking to develop cloud security strategies.
October 6, 2014 US Cybercrime Survey Says Companies Missing the Mark 2 min read - According to a recent cybercrime survey, companies need to improve their security policies to properly detect and mitigate potential risks.
Identity & Access June 30, 2014 The ABCs of IAM Security 4 min read - Traditional IAM solutions are no longer enough to secure your firm's network and information; today's ever-evolving threats require advanced tools.