Skip to main content


1 - 18 of  18 results

   1.Reviewing a year of serious data breaches, major attacks and new vulnerabilities 
 The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015. 
 
Sales Support Material|SEW03133USEN| Modified: 2016-04-19
  
 
 
   2.IBM Security Services 2015 Cyber Security Intelligence Index for Information and Communications 
 The Cyber Security Intelligence Index for Information and Communications offers a high-level overview of the major threats to information and communications businesses worldwide in 2014 
 
Sales Support Material|SEW03129USEN| Modified: 2015-12-29
  
 
 
   3.IBM Security Services 2015 Cyber Security Intelligence Index for Retail 
 The Cyber Security Intelligence Index for Retails offers a high-level overview of the major threats to retail businesses worldwide in 2014. 
 
Sales Support Material|SEW03130USEN| Modified: 2015-12-09
  
 
 
   4.Protecting patient data - The alarming state of cybersecurity in the healthcare industry 
 This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain. 
 
Sales Support Material|SEW03044USEN| Modified: 2015-11-23
  
 
 
   5.IBM Security Services 2015 Cyber Security Intelligence Index for Manufacturing 
 The Cyber Security Intelligence Index for Manufacturing offers a high-level overview of the major threats to the manufacturing industry worldwide over the past year. 
 
Sales Support Material|SEW03080USEN| Modified: 2015-08-31
  
 
 
   6.The ABCs of security strategy 
 IBM Security Strategy, Risk and Compliance Services helps organizations apply the ABCs of security strategy: align business and IT technologies; build an adaptable security posture; create a balanced approach for people, processes and technology; and ... 
 
Sales Support Material|SEW03081USEN| Modified: 2015-08-14
  
 
 
   7.Enabling and Optimizing Hybrid IT Operations (White paper (external)-USEN) 
 Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and ... 
 
Sales Support Material|SEW03077USEN| Modified: 2015-07-29
  
 
 
   8.IBM 2015 Cyber Security Intelligence Index 
 The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year. 
 
Sales Support Material|SEW03073USEN| Modified: 2015-07-24
  
 
 
   9.IBM Security Services 2015 Cyber Security Intelligence Index for Financial Services 
 The Cyber Security Intelligence Index for Financial Services offers a high-level overview of the major threats to the financial services industry worldwide over the past year. 
 
Sales Support Material|SEW03079USEN| Modified: 2015-07-21
  
 
 
   10.IBM Security Services 2014 Cyber Security Intelligence Index for Manufacturing 
 This white paper provides insights into the current threat landscape for the manufacturing industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03048USEN| Modified: 2015-01-08
  
 
 
   11.IBM Security Services 2014 Cyber Security Intelligence Index for Energy and Utilities 
 This white paper provides insights into the current threat landscape for the energy and utilities industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03049USEN| Modified: 2015-01-08
  
 
 
   12.IBM Security Services 2014 Cyber Security Intelligence Index for Financial Services 
 This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03046USEN| Modified: 2014-11-10
  
 
 
   13.IBM Security Services 2014 Cyber Security Intelligence Index for Retail Services 
 This white paper provides insights into the current threat landscape for the retail services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... 
 
Sales Support Material|SEW03045USEN| Modified: 2014-10-20
  
 
 
   14.Selecting a Managed Security Services Provider: The 10 most important criteria to consider (White paper (external)-USEN) 
 This white paper outlines a strategic approach to selecting a managed security services provider and establishes 10 of the most important qualifications to consider in choosing a provider. 
 
Sales Support Material|SEW03026USEN| Modified: 2014-08-14
  
 
 
   15.Strategy considerations for building a security operations center 
 This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC). 
 
Sales Support Material|SEW03033USEN| Modified: 2014-08-14
  
 
 
   16.IBM Security Services cyber security intelligence index for retail (White paper (external)-USEN) 
 A white paper providing insights into current cyber threats against the retail industry based on IBM data collected from monitoring client security devices and addressing cyber security incidents. 
 
Sales Support Material|SEW03037USEN| Modified: 2013-11-19
  
 
 
   17.Defending against increasingly sophisticated DDoS attacks (White paper (external)-USEN) 
 This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks. 
 
Sales Support Material|SEW03035USEN| Modified: 2013-08-30
  
 
 
   18.Securing mobile devices in the business environment (White paper (external)-USEN) 
 This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value. 
 
Sales Support Material|SEW03027USEN| Modified: 2011-11-08