Start collaborating
Limited-Time Offer: 50% off IBM TechXchange Conference 2025
IBM’s largest technical learning event is back October 6-9 in Orlando, FL
Introduction In the rapidly evolving digital workplace, seamless communication and email management are critical for maintaining operational efficiency and collaboration. Many organizations face ...
Upgrading IBM Guardium from version 12 to 12.1 is essential to maintain optimal performance, security, and compliance. This blog provides a detailed, step-by-step procedure to ensure a smooth upgrade process. ...
Integrating multiple IAM systems is an essential strategy for organizations facing the complexities of hybrid IT, mergers, regulatory compliance, multi-cloud environments, and legacy-modern system integration. ...
For years, technology departments have struggled to rein in shadow IT- the use of unauthorized devices, software, and services outside of official IT approval. But the sudden transition to remote work ...
IBM’s 2024 Cost of a Data Breach report found that stolen or compromised credentials were the most frequent attack vector with a 71% year-on-year increase in the use of these compromised credentials ...
Integrating IBM Guardium with an SMTP server enhances the system's ability to send customized, real-time email alerts for various security events. This integration is particularly beneficial for security ...
Deployment Steps for CipherTrust Transparent Encryption for Kubernetes Overview: Deploying CipherTrust Transparent Encryption (CTE) for Kubernetes ensures that sensitive data within containers ...
Query rewrite is a functionality provided by the Guardium that allows databased queries to be rewritten based on the query rewrite definition and security policy. The queries entered by the user are rewritten ...
Welcome to our final Touchpoint of 2024. We thank you for being a MaaS360 customer and want to let you know of some upcoming changes for 2025! We're working on a redesign of this Touchpoint that ...
According to Statista, global data creation is set to skyrocket from 149 zettabytes in 2024 to over 394 zettabytes by 2028—a staggering 164.43% increase. This unprecedented growth highlights the urgent ...
The newest version introduces a revamped user experience and powerful new features designed to help simplify and accelerate key management while expanding endpoint support and aligning with industry standards. ...
In our mobile first / mobile last world - many employees’ workday both starts and ends on a mobile device. Mobile devices are now essential tools for productivity and communication, especially as many ...
MaaS360: Ask Me Anything about Operating System Updates We hope you enjoyed our recent Ask Me Anything on MaaS360 Compliance Rules. In this blog, we've summarized the key points and added some ...
Identity verification and access management are dramatically changing the global digital security market. Traditional password-based authentication and manual identity checks are insufficient to handle ...
How to Set Up LDAP Authentication in IBM Guardium Data Security Center with Microsoft Active Directory Setting up LDAP authentication with IBM Guardium Data Security Center (GDSC) enables centralized ...
Apple TV Device Management Authors - Kiran Naidu ( @Kiran Kumar Naidu Srp ) and Prasad Kulkarni ( @Prasad Kulkarni ) 1 Introduction – Apple TV, once a device ...
In the world of Identity and Access Management (IAM), administrators face a daunting challenge: creating, maintaining, and ensuring compliance for access policies that govern sensitive applications. Traditionally, ...
How to Integrate Google Workspace with MaaS360 for Device Management In today's digital landscape, efficient and secure management of business tools is vital for any organization. Google Workspace ...