White Papers by Topic: Security

Resources available: 327

Mobile Data Security: Finding the Balance

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.

Protect Your Company, Read the "Internet Threats Trend Report"

Empower your company to defend its critical information assets with CYREN's Internet Threats Trend Report, which includes actionable data about new threat activity.

MDM and MAM: Adding Security with App-Wrapping

In this paper, we'll explore how app-wrapping strikes the right balance between IT control and user empowerment, so you can maximize your rewards.

Enterprise Mobility Solutions Brochure

Every company will have a different path to mobile adoption, and final implementations will vary, depending on the needs of various business functions and on regulations that impact mobile policies.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Guard data in government environments by implementing continuous diagnostics and mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities. Read this white paper to learn more.

Reduce federal infrastructure risk with compliance management and situational awareness

IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.

Why It Pays to Use Electronic Signatures

No matter the size or what type of business you're in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that.

Cloud Managed Security: An Evolution in Enterprise Cloud Security

Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform- but that doesn't automatically make it secure.

©1994-2014 Infoworld, Inc.