.

Detect Insider Threats with User Behavior Analytics

A 2020 Ponemon Institute study reported a staggering 47% rise in insider threats over the past two years. While, historically, insider threats have always accounted for majority of cyberattacks, you might ask what changed in the last two years to cause this massive spike? The pandemic, which resulted in rise of remote work, and acceleration […]

Continue reading

Role of CIO In Blending Business & Technology

We present the ‘flex model’ that will enable CIOs to blend the business and technology capability for future proofing their enterprise.

Continue reading

Are you ready for Digital Transformation?


2021 CEO Study: Find your essential

How to thrive in a post-pandemic reality?

2021 CEO Study

Explore key insights from global CEOs.

Read the report


Search for topic


Detect Insider Threats with User Behavior Analytics

A 2020 Ponemon Institute study reported a staggering 47% rise in insider threats over the past two years. While, historically, insider threats have always accounted for majority of cyberattacks, you might ask what changed in the last two years to cause this massive spike? The pandemic, which resulted in rise of remote work, and acceleration […]

Continue reading

IBM Security – Keeping The Flag Flying High

It is with immense pride that I want to share a couple of significant announcements related to our security portfolio. IBM Security QRadar, our flagship security software offering, has been positioned as a leader in the Gartner Magic Quadrant for SIEM. Also, IBM is positioned as a leader in the IDC MarketScape: Asia/Pacific Cloud Security […]

Continue reading

Why IBM Power Systems is Best in Class Private Cloud Systems for Banking

Digital transactions are growing at an unprecedented rate in the current pandemic, with banks rapidly augmenting applications to cater to this exceptional growth.

Continue reading

Supercharge Container Data Resilience and Protection With IBM Spectrum Protect Plus

Higher data volumes, complex architectures, and siloed underlying infrastructures are increasing IT budgets and manageability challenges.

Continue reading

How is SecurView Securing It’s Clients’ Digital Transformation Journey With Its Next-Gen SOC?

Today, it is well-positioned to guide enterprises’ security architecture in their digital transformation roadmap.

Continue reading

Preserving Customer Privacy With Zero Trust

To say that the pandemic accelerated the growth in online shopping, as more people chose to make purchases from the comforts of their home, is an understatement. Digital interactions on a rise As per a survey titled IBM Consumer Security Study – India Report, conducted by Morning Consult, on behalf of IBM Security, there was […]

Continue reading

Hybrid cloud platform approach is a key enabler for enterprise reinvention towards business acceleration for Communication Service Providers

Most enterprises are yet to unlock the full value of enterprise transformation, limited to only “greenfield implementation” or “lift and shift” paradigms.

Continue reading

Why it is no overstatement to call IBM Z / IBM LinuxONE the Mother of all platforms in Virtualization?

Let’s begin with a little bit of history IBM invented the “Hypervisor” in the 1960s for its mainframe computers. As anybody associated with the IT infrastructure, from the Cloud Solution Architect to the Data Center Personnel, would understand and agree: “Cloud computing wouldn’t be possible without Virtualization, and Virtualization wouldn’t be possible without the Hypervisor.” […]

Continue reading