Whitepaper

Benefits of Migration to Modern Middleware Services

Business applications are no longer isolated to the back office. Today, these applications are at the forefront of the way businesses interact with customers, suppliers, and partners. As customer expectations change, these applications must change at a rapid pace. This puts enormous pressure on the software development team to keep up with demand. The development

RED HAT JBOSS A-MQ COMPARED WITH IBM WEBSPHERE MQ 7.5

The ability to integrate systems and share data across the enterprise is a common datacenter need. Shared data needs to be transported between endpoints, and in today’s connected world we assume the capability to reliably move data is ever-present. That is a compliment to messaging platforms like Red Hat® JBoss® A-MQ. Messaging gets data from

JBoss Enterprise Application Platform and Oracle WebL ogic Se rver Enterprise Edition

The technology foundation for both JBoss Enterprise Middleware from Red Hat and Oracle Fusion Middleware is the application platform. Red Hat and Oracle offer their application platforms, JBoss Enterprise Application Platform and Oracle WebLogic Server (respectively), as standalone technology. Application platforms are also the basis of other enterprise technologies such as enterprise service bus, business

Reputational risk and IT in the insurance industry

Reputational risk and IT in the insurance industry: How security and business continuity can shape the reputation and value of your company is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era, where IT is an integral part of the organization and IT failures can result

Six keys to effective reputational and IT risk management

The IBM Global Reputational Risk and IT Study is one of the largest studies ever conducted to examine the relationship between IT and reputational risk. The initial group of 427 respondents participated in a survey conducted by the Economist Intelligence Unit on behalf of IBM. An additional 175 respondents participated in the study online at

Virtualizing disaster recovery using cloud computing

Almost from the beginning of widespread adoption of computers, organizations realized that disaster recovery was a necessary component of their information technology (IT) plans. Business data had to be backed up, and key processes like order entry, billing, payroll and procurement needed to continue even if an organization’s data center was disabled due to a

IBM Security Services Cyber Security Intelligence Index

IBM Managed Security Services continuously monitors tens of billions of events per day for more than 3,700 clients in over 130 countries. This report is based on the cyber security event data we collected between 1 April 2012 and 31 March 2013 in the course of monitoring client security devices as well as data derived

Preventing security risks in real time

As the world becomes more digitized and interconnected, the door to emerging security leaks has opened wider. Today, there are billions of RFID tags for items including products, passports, buildings and animals. With more than two billion Internet users and cellular phone subscriptions now exceeding five billion, nearly one in three people worldwide surfs the

Responding to—and recovering from—sophisticated security attacks

Like so many other things in today’s world, cyber attacks— along with those who perpetrate them—are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and data across multiple devices. It’s now clear that simply protecting an organization’s perimeter is not enough.

Surviving The Technical Security Skills Crisis

Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious, organizations need skilled technical staff to meet increasing security and compliance demands. However, this has been a losing battle. IBM counted more than 137 million attempted attacks against its 3,700-plus