Risk Management Research
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Four steps to ensure IT investments benefit regulatory compliance
Sponsored by: Hewlett Packard EnterpriseIn this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
-
Data Loss Prevention: Decision Time
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Big Data Architecture: Build, Buy or Blend?
Sponsored by: TechTarget CIOCIOs face a quandary in big data architecture: Do I buy or build? New business problems, inadequate vendor solutions and myriad new technologies complicate that question.
-
Vendor Landscape: Intrusion Detection and Prevention Systems
Sponsored by: IBMThis comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
-
A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMFind out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
-
Security for a Faster World
Sponsored by: Hewlett Packard EnterpriseThis eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
-
3 Big data security analytics techniques you can apply now to catch advanced persistent threats
Sponsored by: Hewlett Packard EnterpriseIn this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Information Security Magazine – July/August 2014
Sponsored by: TechTarget SecurityBig data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
-
Enterprise Information Security in Transition
Sponsored by: IBMThis white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMThis white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
Security best practices for file-based data movement— an IT practitioner’s guide
Sponsored by: IBMIn this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
-
Managed file transfer: Minimizing risk and strengthening compliance in data exchange
Sponsored by: IBMIn this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
-
How CIOs are Increasing Innovation by Harnessing Big Data
Sponsored by: Red HatThis whitepaper explains the benefits of a new storage solution that allows you to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across an organization.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.