Skip to main content


1 - 17 of  17 results

   1.IBM Security Services 2014 Cyber Security Intelligence Index for Financial Services 
 This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03046USEN| Modified: 2014-11-10
  
 
 
   2.IBM Security Services 2014 cyber security intelligence index for retail services 
 This white paper provides insights into the current threat landscape for the retail services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03045USEN| Modified: 2014-10-20
  
 
 
   3.Strategy considerations for building a security operations center 
 This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC). 
 
Sales Support Material|SEW03033USEN| Modified: 2014-08-14
  
 
 
   4.Selecting a Managed Security Services Provider: The 10 most important criteria to consider (White paper (external)-USEN) 
 This white paper outlines a strategic approach to selecting a managed security services provider and establishes 10 of the most important qualifications to consider in choosing a provider. 
 
Sales Support Material|SEW03026USEN| Modified: 2014-08-14
  
 
 
   5.The challenge of protecting critical data (White paper (external)-USEN) 
 The IBM Critical Protection for the Crown Jewels whitepaper helps enterprises understand how IBM can help them identify and protect their most critical business information over the full data lifecycle—from acquisition to disposal. 
 
Sales Support Material|SEW03040USEN| Modified: 2014-05-06
  
 
 
   6.IBM Security Services cyber security intelligence index for financial services (White paper (external)-GBEN) 
 This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to and performing forensics on, cyber ... 
 
Sales Support Material|SEW03034GBEN| Modified: 2014-03-12
  
 
 
   7.IBM Security Services cyber security intelligence index: energy and utilities (White paper (external)-GBEN) 
 This white paper provides insights into the current threat landscape for energy and utilities. Information is based on cyber security event data collected by IBM, as well as data derived from responding to and performing forensics on, cyber security ... 
 
Sales Support Material|SEW03036GBEN| Modified: 2014-03-12
  
 
 
   8.Defending against increasingly sophisticated distributed denial of service attacks (White paper (external)-GBEN) 
 This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks. 
 
Sales Support Material|SEW03035GBEN| Modified: 2013-11-25
  
 
 
   9.IBM Security Services cyber security intelligence index for retail (White paper (external)-USEN) 
 A white paper providing insights into current cyber threats against the retail industry based on IBM data collected from monitoring client security devices and addressing cyber security incidents. 
 
Sales Support Material|SEW03037USEN| Modified: 2013-11-19
  
 
 
   10.IBM Security Services Cyber Security Intelligence Index report 
 This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber ... 
 
Sales Support Material|SEW03031USEN| Modified: 2013-11-15
  
 
 
   11.IBM Security Services cyber security intelligence index: energy and utilities (White paper (external)-USEN) 
 This white paper provides insights into the current threat landscape for energy and utilities. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security ... 
 
Sales Support Material|SEW03036USEN| Modified: 2013-10-03
  
 
 
   12.Responding to--and recovering from--sophisticated attacks 
 Responding to--and recovering from--sophisticated attacks 
 
Sales Support Material|SEW03029GBEN| Modified: 2013-09-27
  
 
 
   13.Defending against increasingly sophisticated DDoS attacks (White paper (external)-USEN) 
 This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks. 
 
Sales Support Material|SEW03035USEN| Modified: 2013-08-30
  
 
 
   14.IBM Security Services cyber security intelligence index for financial services (White paper (external)-USEN) 
 This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03034USEN| Modified: 2013-08-27
  
 
 
   15.IBM Security Services Cyber Security Intelligence Index 
 This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber ... 
 
Sales Support Material|SEW03031GBEN| Modified: 2013-07-11
  
 
 
   16.Securing mobile devices in the business environment (White paper (external)-USEN) 
 This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value. 
 
Sales Support Material|SEW03027USEN| Modified: 2011-11-08
  
 
 
   17.Strategies for assessing cloud security 
 To fully benefit from cloud computing, clients must ensure that data, applications and systems are properly secured. IBM offers end-to-end solutions that enable a business-driven and holistic approach to quantifying security risks and protecting cloud ... 
 
Sales Support Material|SEW03022USEN| Modified: 2010-12-02