Skip to main content


1 - 17 of  17 results

   1.Protecting patient data - The alarming state of cybersecurity in the healthcare industry 
 This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain. 
 
Sales Support Material|SEW03044USEN| Modified: 2016-11-29
  
 
 
   2.An integrated approach to insider threat protection 
 Safeguard against harmful insider actions with trusted security expertise, actionable intelligence and powerful technology. 
 
Sales Support Material|SEW03147USEN| Modified: 2016-11-18
  
 
 
   3.IBM Security Services 2015 Cyber Security Intelligence Index for Information and Communications 
 The Cyber Security Intelligence Index for Information and Communications offers a high-level overview of the major threats to information and communications businesses worldwide in 2014 
 
Sales Support Material|SEW03129USEN| Modified: 2016-10-28
  
 
 
   4.Securing virtualization in real-world environments (White paper (external)-USEN) 
 Today's organizations need to understand the security risks that are inherent in virtualized environments, and evaluate solutions that are designed to address these challenges, including IBM security solutions that can help position organizations to reap the full rewards of virtualization. 
 
Sales Support Material|SEW03016USEN| Modified: 2016-09-21
  
 
 
   5.Selecting a Managed Security Services Provider: The 10 most important criteria to consider (White paper (external)-USEN) 
 This white paper outlines a strategic approach to selecting a managed security services provider and establishes 10 of the most important qualifications to consider in choosing a provider. 
 
Sales Support Material|SEW03026USEN| Modified: 2016-08-22
  
 
 
   6.The challenge of protecting critical data (White paper (external)-USEN) 
 The IBM Critical Protection for the Crown Jewels whitepaper helps enterprises understand how IBM can help them identify and protect their most critical business information over the full data lifecycle—from acquisition to disposal. 
 
Sales Support Material|SEW03040USEN| Modified: 2016-08-16
  
 
 
   7.Designing an identity and access management program optimized for your business 
 In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. Four key steps that can move you toward a more mature solution now 
 
Sales Support Material|SEW03038USEN| Modified: 2016-07-25
  
 
 
   8.Reviewing a year of serious data breaches, major attacks and new vulnerabilities 
 The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015. 
 
Sales Support Material|SEW03133USEN| Modified: 2016-04-19
  
 
 
   9.IBM Security Services 2015 Cyber Security Intelligence Index for Manufacturing 
 The Cyber Security Intelligence Index for Manufacturing offers a high-level overview of the major threats to the manufacturing industry worldwide over the past year. 
 
Sales Support Material|SEW03080USEN| Modified: 2015-08-31
  
 
 
   10.The ABCs of security strategy 
 IBM Security Strategy, Risk and Compliance Services helps organizations apply the ABCs of security strategy: align business and IT technologies; build an adaptable security posture; create a balanced approach for people, processes and technology; and develop a risk-based security program. 
 
Sales Support Material|SEW03081USEN| Modified: 2015-08-14
  
 
 
   11.Enabling and Optimizing Hybrid IT Operations (White paper (external)-USEN) 
 Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform. 
 
Sales Support Material|SEW03077USEN| Modified: 2015-07-29
  
 
 
   12.IBM 2015 Cyber Security Intelligence Index 
 The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year. 
 
Sales Support Material|SEW03073USEN| Modified: 2015-07-24
  
 
 
   13.IBM Security Services 2015 Cyber Security Intelligence Index for Financial Services 
 The Cyber Security Intelligence Index for Financial Services offers a high-level overview of the major threats to the financial services industry worldwide over the past year. 
 
Sales Support Material|SEW03079USEN| Modified: 2015-07-21
  
 
 
   14.IBM Security Services 2014 Cyber Security Intelligence Index for Energy and Utilities 
 This white paper provides insights into the current threat landscape for the energy and utilities industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents. 
 
Sales Support Material|SEW03049USEN| Modified: 2015-01-08
  
 
 
   15.IBM Security Services 2014 Cyber Security Intelligence Index for Manufacturing 
 This white paper provides insights into the current threat landscape for the manufacturing industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents. 
 
Sales Support Material|SEW03048USEN| Modified: 2015-01-08
  
 
 
   16.IBM Security Services cyber security intelligence index for retail (White paper (external)-USEN) 
 A white paper providing insights into current cyber threats against the retail industry based on IBM data collected from monitoring client security devices and addressing cyber security incidents. 
 
Sales Support Material|SEW03037USEN| Modified: 2013-11-19
  
 
 
   17.Defending against increasingly sophisticated DDoS attacks (White paper (external)-USEN) 
 This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks. 
 
Sales Support Material|SEW03035USEN| Modified: 2013-08-30