Strategic Technology: Network Intrusion Prevention System (IBM IPS)
This entry is part 17 of 33 in the series Strategic Technologies
This entry is part 17 of 33 in the series Strategic Technologies
This entry is part 16 of 33 in the series Strategic Technologies
This entry is part 15 of 33 in the series Strategic Technologies
This entry is part 14 of 33 in the series Strategic TechnologiesFiberlink MaaS360 allows clients to address their BYOD challenges by offering cloud-based mobile device management (MDM), Mobile Application Management (MAM) and secure containerization; giving organizations the building blocks to separate data and content in personal applications from data and content in enterprise applications on… Read More »
This entry is part 13 of 33 in the series Strategic TechnologiesMobile messaging provides an SDK that applications use to allow messages to be transmitted to the app according to customer preferences and user characteristics. This provides a single messaging platform instead of different message channels across mobile ecosystems. IBM Xtify, IBM’s recent acquisition, helps… Read More »
This entry is part 12 of 33 in the series Strategic TechnologiesIn many cases, to be practical mobile app testing must be automated with tools that have some sort of record/replay functionality. One enabler for this capability is the IBM Rational Workbench Toolset. Another approach is a cloud-based set of services named Mobile Quality Assurance… Read More »
This entry is part 9 of 10 in the series Strategic IT CapabilitiesBoth customer and employee mobile apps must be tested across numerous devices, operating systems, carriers, etc. This generally requires specialized tools.
This entry is part 11 of 33 in the series Strategic TechnologiesTransaction Security Intelligence software looks at devices to determine their security state such as jail-broken, rooted, malware, fraudulent activity, etc.
This entry is part 10 of 33 in the series Strategic TechnologiesThe most fundamental requirement is to automatically scan application source code to identify security vulnerabilities.
This entry is part 8 of 10 in the series Strategic IT CapabilitiesAll systems of engagement need a security architecture, but this is particularly important for financial services. Mobile apps need to have security designed into them directly to protect sensitive data that they are using or have persisted to the device. The device also… Read More »