Back to Results
First PageMeta Content
Computer network security / Electronic commerce / Software testing / Cloud computing / Application security / Penetration test / Payment Card Industry Data Security Standard / McAfee / Vulnerability / Computing / Computer security / Security


IBM Sales and Distribution Thought Leadership White Paper Integrated IT security for midsize businesses Protecting cloud, data and mobile environments of midsize businesses
Add to Reading List

Document Date: 2014-09-25 04:04:33


Open Document

File Size: 782,74 KB

Share Result on Facebook

Company

IBM / Aberdeen Group / Endpoint / Nokia / Google / Backup Services / Virtual / IBM Managed Security Services / IBM Tivoli Endpoint / Microsoft / IBM Endpoint / /

Currency

USD / /

Facility

Ponemon Institute / /

IndustryTerm

near real-time visibility / computer operating systems / Cross-site / web applications / corporate management / owned devices / hybrid and basic mobile applications / approved applications / higher risk computing / security solution / business to business / web browser vulnerabilities / software-based keyboards / remediation services / security products / software usage patterns / desktop operating systems / mobile operating systems / security management / asset management / unprecedented real-time visibility / system software / security intelligence solutions / signed applications / specific tools / media attention / patch management / web application vulnerabilities / customer relationship management / even specialty devices / Internet connections / personal mobile devices / security intelligence tool / software assets / Social media / software-use analysis / access management solutions / web vulnerability disclosures / security services / managed security services / security technology industry / storage-intensive applications / economical solutions / mobile devices / basic client applications / configured hardware / penetration testing services / cloud computing / technology trends / restoration services / device management / mature applications / desktop computing environments / security software / software distribution / Remote device / cloud services / security solutions / internal applications / /

OperatingSystem

UNIX / VMs / Symbian / Linux / Android / BlackBerry / Microsoft Windows / /

Organization

IBM Managed Security Service / Ponemon Institute / /

Position

Manager / Manager for Mobile Devices / IBM Tivoli Endpoint Manager / leader in security research and development / midsize businesses Executive / General Business 2 Integrated IT security / /

Technology

virtual machine / CRM / facial recognition / Linux / UNIX / disk encryption / Android / Mobile device / operating system / operating systems / Mobile technology / mobile devices / voice recognition / smartphones / third-party technology / /

SocialTag