security

Modern data protection innovations to fight cyber threats

Cloud computing, Cloud object storage, Data security...

In 2018, the average cost of a data security breach approached $3.9 million. But organizations that fully deployed security automation saved over $1.5 million per breach.[1] These metrics demonstrate the value of effective data protection and security solutions, and underscore the significance of recent data security-related announcements from IBM. “ESG’s research clearly shows that data ...read more


Security considerations for critical environments

Data security, Linux systems, LinuxONE solutions...

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches ...read more


A sneak peek of the Think 2019 Infrastructure campus

AI, Big data & analytics, Cloud computing...

“It can be hard to keep up with all of the technology shifts and changes these days. IBM Think helps me because it addresses all of them including AI, cloud, analytics, infrastructure, security, and even nascent trends like quantum computing!” – Craig S. Mullins, President & Principal Consultant, Mullins Consulting Inc. Think 2019 is fast ...read more


Is your smartphone data safer than your enterprise data?

Data security, Encryption, Linux systems...

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only ...read more


Meet digital transformation challenges by scaling IT systems

Banking & finance, Data security, Digital transformation...

Digital transformation, with its new paradigms, presents challenges to your enterprise. New business models are pressuring organizations to rapidly innovate and respond. Success in this environment requires an enterprise IT ecosystem that’s scalable and agile – able to swiftly accommodate growing and shifting business needs. As an IT or operations executive, you constantly face the ...read more


Three ways to thrive in the digital age [New Solitaire report]

Data security, Linux systems, LinuxONE solutions...

The pace of business has rapidly accelerated in recent years. Your enterprise must constantly innovate products and services while keeping costs down and data secure. Solitaire Interglobal Limited (SIL), a research firm with over 40 years of experience, has tapped its vast market database to analyze how IT infrastructure can help organizations meet these challenges. ...read more


Three ways to collaborate to improve cybersecurity

Data security, Encryption, Linux systems...

The stakes are high in enterprise security. Data breaches can damage your organization’s reputation and result in significant costs (USD 3.86 million for every breach on average according to this Ponemon Cost of a Data Breach study). They can also destroy customer trust. Recent research has found that more than 78 percent of customers would ...read more


Client agility improved with continuous delivery & IBM z/VM

Linux on z, Linux servers, Linux systems...

For years, IBM z/VM® virtualization technology has provided high levels of extreme scalability and security, providing a robust foundation for infrastructure as a service on IBM Z and IBM LinuxONE servers. While cloud computing has become the standard use model for IT services, an IT infrastructure is always the foundation for every IT service. Realizing ...read more


DBaaS + Security @ MongoDB World

Data security, Encryption, Linux servers...

How important are automation and security for your enterprise data? While today’s business leaders want to automate tasks to eliminate human errors and security breaches, they don’t want to spend time on technical details. Managing databases in the traditional way requires a lot of highly-specialized technical knowledge, and DB admins must know and handle nearly ...read more