What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Whitepapers


GameChanger: Continuous Monitoring

Organizations all over the world are struggling with how to guard their systems against new, targeted cyber threats and federal agencies are no exception. The goal is to stop attacks as early as possible, or cut short their ability to inflict widespread damage. With continuous monitoring, agencies constantly assess the state of their information security controls across their entire enterprise. The hope is that with constant review, greater security will follow. Download this informative whitepaper for more on how continuous monitoring needs a measured approach.


Filling Your Cybersecurity Gaps is Just Good Business

The traditional cybersecurity infrastructure contains several detection, analysis and remediation gaps. Today, organizations need to focus on two main things: detecting unknown threats and reducing response time. Download this informative whitepaper to read more on the weaknesses of the traditional cybersecurity model and how agencies are filling the gaps.


Delivering Success that Scales with the Largest Enterprises

IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and event management (SIEM) solutions. In order to support the demands of organizations across industries, IBM offers the geographic reach to serve global organizations and the partner ecosystem required to deliver powerful and comprehensive solutions.


How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security

This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.


2012 IBM X-Force Annual Trend and Risk Report

The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.


Increase Productivity and Security with Identity and Access Management

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. To meet the needs of a changing user population while simultaneously maintaining a security-rich environment, organizations need identity management solutions that can define, grant and remove access privileges to match the user’s job role and actual access requirements.


IBM Security Intrusion Preventions Solutions

As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers a comprehensive portfolio of intrusion prevention solutions that go beyond traditional intrusion prevention to provide multilayered, end-to-end security that can actually protect networks from attacks before they occur.


Integrating Security into Development, No Pain Required

In this whitepaper, senior SANS Analyst Dave Shackleford duscusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.


Secure By Design: Building Identity-based Security into Today’s Information Systems

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible


Worst Practices in Predictive Analytics

In this white paper, we will investigate worst practices in predictive analytics. We’ll discuss why these actions can derail predictive analytics initiatives, and what steps can be taken to avoid making such mistakes. We’ll also highlight the key steps required for building and deploying effective predictive applications, and showcase WebFOCUS RStat, today’s most powerful and full-featured solution for predictive analytics.


Take an Intelligence-Led, Proactive, Predictive Approach to Law Enforcement

This paper will show how police departments in cities ranging in size from Houston, Texas to Erlanger, Kentucky to Richmond, Virginia, quickly implemented technology that enables them to address their unique situations and take a successful intelligence-led, proactive, predictive approach to fighting crime. Their high-tech crime centers use business intelligence (BI), analytics, and geographic information system (GIS) mapping to improve organization and boost strategic decision-making, increasing morale and efficiency and making their cities safer.


Windows To Go: Cost and ROI

This exclusive research whitepaper provides an overview of the Windows-enabled USB flash drive approach to enabling remote work. It also provides detailed comparisons between Virtual Desktop Interface (VDI), conventional laptop provisioning and Windows-enabled USB flash drives under different scenarios. Download to learn more.