White Papers by Topic: Security

Resources available: 157

Unifying Secuirty Operations

Agile enterprises know that the way to quickly identify and react to threats to the business is to break down operational siloes by using collaborative processes, relationships, and shared resources.

Guard data in government environments by implementing continuous diagnostics and mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities. Read this white paper to learn more.

Reduce federal infrastructure risk with compliance management and situational awareness

IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.

Reducing the cost and complexity of endpoint management

IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations. Read this whitepaper to learn more.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion

Read this whitepaper to learn how the Accellion private cloud solution answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.

Is Your Credit Card Data Safe from Hacks?

News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected?

Data Security for Mobile Users: One Size Does Not Fit All

Read this whitepaper to learn the key criteria for customizing a mobile security policy for your users.

Enterprise Mobility Management: A Data Security Checklist

This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks

Read this whitepaper to learn the security risks associated with not having an IT endorsed file sharing solution, and why your organization should be rethinking public-cloud file sharing.

Mobile Data Security: Best Practices for Securing Your Mobile Workforce

Read this whitepaper to learn the steps to reduce the risk of mobile data breaches while keeping mobile workers productive.

©1994-2014 Infoworld, Inc.