White Papers by Topic: Security

Resources available: 336

Utilizing Security Ratings for Enterprise IT Risk Mitigation

In this white paper, learn how BitSight Security Ratings help businesses streamline security operations, remediate threats and engage business executives in cyber security strategy.

Making Risk Management More Effective with Security Ratings

When it comes to understanding security performance, today's risk assessment methods leave many blind spots.

MDM and MAM: Adding Security with App-Wrapping

In this paper, we'll explore how app-wrapping strikes the right balance between IT control and user empowerment, so you can maximize your rewards.

Enterprise Mobility Solutions Brochure

Every company will have a different path to mobile adoption, and final implementations will vary, depending on the needs of various business functions and on regulations that impact mobile policies.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Guard data in government environments by implementing continuous diagnostics and mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities. Read this white paper to learn more.

Reduce federal infrastructure risk with compliance management and situational awareness

IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.

Combating Identity Theft in a Mobile, Social World

Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large.

After a Breach: Managing Identity Theft Effectively

This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for customers into a positive, relationship-building experience.

Combating Identity Fraud in a Virtual World

This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks of identity fraud and what individuals and businesses can do to keep personal information safe.

©1994-2014 Infoworld, Inc.