15 1 20 15 UTF-8 Unable to retrive query log filename /gsa/a01gsa/.projects/p1/aheweb01/projects/www/tmp/common/ssi/cache/gumshoequery_apilite/ESQS_1423938737989.xml 0 Log not available SA WH XSE_*%20or%20XSE_SEX 1825 us summary keeponlit yes 0 0 0 0 15 0 0 0 0 0 0 0 0 0 0 0 0 IBM Security Services 2014 Cyber Security Intelligence Index for Manufacturing This white paper provides insights into the current threat landscape for the manufacturing industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... en Sales Support Material SA SEW03048USEN ECM 2015-01-08 http://www.ibm.com/common/ssi/ecm/se/en/sew03048usen/index.html en 2015-01-08 White Papers WH SEW03048USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03048USEN SEW03048USEN.PDF 529 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03048USEN&attachment=SEW03048USEN.PDF IBM Security Services 2014 Cyber Security Intelligence Index for Energy and Utilities This white paper provides insights into the current threat landscape for the energy and utilities industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... en Sales Support Material SA SEW03049USEN ECM 2015-01-08 http://www.ibm.com/common/ssi/ecm/se/en/sew03049usen/index.html en 2015-01-08 White Papers WH SEW03049USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03049USEN SEW03049USEN.PDF 772 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03049USEN&attachment=SEW03049USEN.PDF IBM Security Services 2014 Cyber Security Intelligence Index for Financial Services This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... en Sales Support Material SA SEW03046USEN ECM 2014-11-10 http://www.ibm.com/common/ssi/ecm/se/en/sew03046usen/index.html en 2014-11-10 White Papers WH SEW03046USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03046USEN SEW03046USEN.PDF 974 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03046USEN&attachment=SEW03046USEN.PDF IBM Security Services 2014 Cyber Security Intelligence Index for Retail Services This white paper provides insights into the current threat landscape for the retail services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... en Sales Support Material SA SEW03045USEN ECM 2014-10-20 http://www.ibm.com/common/ssi/ecm/se/en/sew03045usen/index.html en 2014-10-20 White Papers WH SEW03045USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03045USEN SEW03045USEN.PDF 1013 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03045USEN&attachment=SEW03045USEN.PDF Web Security: Protecting The Heart Of Your Business A Custom Technology Adoption Profile Commissioned By Akamai Technologies and IBM. This study surveyed business decision-makers responsible for online customer-facing systems and evaluates business dependence on web applications and the impact of web ... en Sales Support Material SA SEL03029USEN ECM 2014-09-30 http://www.ibm.com/common/ssi/ecm/se/en/sel03029usen/index.html en 2014-09-30 White Papers WH SEL03029USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEL03029USEN SEL03029USEN.PDF 178 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEL03029USEN&attachment=SEL03029USEN.PDF Strategy considerations for building a security operations center This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC). en Sales Support Material SA SEW03033USEN ECM 2014-08-14 http://www.ibm.com/common/ssi/ecm/se/en/sew03033usen/index.html en 2014-08-14 White Papers WH SEW03033USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03033USEN SEW03033USEN.PDF 1 MB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03033USEN&attachment=SEW03033USEN.PDF Selecting a Managed Security Services Provider: The 10 most important criteria to consider (White paper (external)-USEN) This white paper outlines a strategic approach to selecting a managed security services provider and establishes 10 of the most important qualifications to consider in choosing a provider. en Sales Support Material SA SEW03026USEN ECM 2014-08-14 http://www.ibm.com/common/ssi/ecm/se/en/sew03026usen/index.html en 2014-08-14 White Papers WH SEW03026USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03026USEN SEW03026USEN.PDF 1 MB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03026USEN&attachment=SEW03026USEN.PDF The challenge of protecting critical data (White paper (external)-USEN) The IBM Critical Protection for the Crown Jewels whitepaper helps enterprises understand how IBM can help them identify and protect their most critical business information over the full data lifecycle—from acquisition to disposal. en Sales Support Material SA SEW03040USEN ECM 2014-05-06 http://www.ibm.com/common/ssi/ecm/se/en/sew03040usen/index.html en 2014-05-06 White Papers WH SEW03040USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03040USEN SEW03040USEN.PDF 926 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03040USEN&attachment=SEW03040USEN.PDF IBM Security Services cyber security intelligence index for retail (White paper (external)-USEN) A white paper providing insights into current cyber threats against the retail industry based on IBM data collected from monitoring client security devices and addressing cyber security incidents. en Sales Support Material SA SEW03037USEN ECM 2013-11-19 http://www.ibm.com/common/ssi/ecm/se/en/sew03037usen/index.html en 2013-11-19 White Papers WH SEW03037USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03037USEN SEW03037USEN.PDF 1 MB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03037USEN&attachment=SEW03037USEN.PDF IBM Security Services Cyber Security Intelligence Index report This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber ... en Sales Support Material SA SEW03031USEN ECM 2013-11-15 http://www.ibm.com/common/ssi/ecm/se/en/sew03031usen/index.html en 2013-11-15 White Papers WH SEW03031USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03031USEN SEW03031USEN.PDF 586 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03031USEN&attachment=SEW03031USEN.PDF IBM Security Services cyber security intelligence index: energy and utilities (White paper (external)-USEN) This white paper provides insights into the current threat landscape for energy and utilities. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security ... en Sales Support Material SA SEW03036USEN ECM 2013-10-03 http://www.ibm.com/common/ssi/ecm/se/en/sew03036usen/index.html en 2013-10-03 White Papers WH SEW03036USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03036USEN SEW03036USEN.PDF 1 MB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03036USEN&attachment=SEW03036USEN.PDF Defending against increasingly sophisticated DDoS attacks (White paper (external)-USEN) This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks. en Sales Support Material SA SEW03035USEN ECM 2013-08-30 http://www.ibm.com/common/ssi/ecm/se/en/sew03035usen/index.html en 2013-08-30 White Papers WH SEW03035USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03035USEN SEW03035USEN.PDF 735 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03035USEN&attachment=SEW03035USEN.PDF IBM Security Services cyber security intelligence index for financial services (White paper (external)-USEN) This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ... en Sales Support Material SA SEW03034USEN ECM 2013-08-27 http://www.ibm.com/common/ssi/ecm/se/en/sew03034usen/index.html en 2013-08-27 White Papers WH SEW03034USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03034USEN SEW03034USEN.PDF 1 MB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03034USEN&attachment=SEW03034USEN.PDF Securing mobile devices in the business environment (White paper (external)-USEN) This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value. en Sales Support Material SA SEW03027USEN ECM 2011-11-08 http://www.ibm.com/common/ssi/ecm/se/en/sew03027usen/index.html en 2011-11-08 White Papers WH SEW03027USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03027USEN SEW03027USEN.PDF 858 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03027USEN&attachment=SEW03027USEN.PDF Strategies for assessing cloud security To fully benefit from cloud computing, clients must ensure that data, applications and systems are properly secured. IBM offers end-to-end solutions that enable a business-driven and holistic approach to quantifying security risks and protecting cloud ... en Sales Support Material SA SEW03022USEN ECM 2010-11-15 http://www.ibm.com/common/ssi/ecm/se/en/sew03022usen/index.html en 2010-12-02 White Papers WH SEW03022USEN http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03022USEN SEW03022USEN.PDF 280 KB http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03022USEN&attachment=SEW03022USEN.PDF