15
1
20
15
UTF-8
Unable to retrive query log filename
/gsa/a01gsa/.projects/p1/aheweb01/projects/www/tmp/common/ssi/cache/gumshoequery_apilite/ESQS_1423938737989.xml
0
Log not available
SA
WH
XSE_*%20or%20XSE_SEX
1825
us
summary
keeponlit
yes
0
0
0
0
15
0
0
0
0
0
0
0
0
0
0
0
0
IBM Security Services 2014 Cyber Security Intelligence Index for Manufacturing
This white paper provides insights into the current threat landscape for the manufacturing industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ...
en
Sales Support Material
SA
SEW03048USEN
ECM
2015-01-08
http://www.ibm.com/common/ssi/ecm/se/en/sew03048usen/index.html
en
2015-01-08
White Papers
WH
SEW03048USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03048USEN
SEW03048USEN.PDF
529 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03048USEN&attachment=SEW03048USEN.PDF
IBM Security Services 2014 Cyber Security Intelligence Index for Energy and Utilities
This white paper provides insights into the current threat landscape for the energy and utilities industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ...
en
Sales Support Material
SA
SEW03049USEN
ECM
2015-01-08
http://www.ibm.com/common/ssi/ecm/se/en/sew03049usen/index.html
en
2015-01-08
White Papers
WH
SEW03049USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03049USEN
SEW03049USEN.PDF
772 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03049USEN&attachment=SEW03049USEN.PDF
IBM Security Services 2014 Cyber Security Intelligence Index for Financial Services
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ...
en
Sales Support Material
SA
SEW03046USEN
ECM
2014-11-10
http://www.ibm.com/common/ssi/ecm/se/en/sew03046usen/index.html
en
2014-11-10
White Papers
WH
SEW03046USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03046USEN
SEW03046USEN.PDF
974 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03046USEN&attachment=SEW03046USEN.PDF
IBM Security Services 2014 Cyber Security Intelligence Index for Retail Services
This white paper provides insights into the current threat landscape for the retail services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ...
en
Sales Support Material
SA
SEW03045USEN
ECM
2014-10-20
http://www.ibm.com/common/ssi/ecm/se/en/sew03045usen/index.html
en
2014-10-20
White Papers
WH
SEW03045USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03045USEN
SEW03045USEN.PDF
1013 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03045USEN&attachment=SEW03045USEN.PDF
Web Security: Protecting The Heart Of Your Business
A Custom Technology Adoption Profile Commissioned By Akamai Technologies and IBM. This study surveyed business decision-makers responsible for online customer-facing systems and evaluates business dependence on web applications and the impact of web ...
en
Sales Support Material
SA
SEL03029USEN
ECM
2014-09-30
http://www.ibm.com/common/ssi/ecm/se/en/sel03029usen/index.html
en
2014-09-30
White Papers
WH
SEL03029USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEL03029USEN
SEL03029USEN.PDF
178 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEL03029USEN&attachment=SEL03029USEN.PDF
Strategy considerations for building a security operations center
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
en
Sales Support Material
SA
SEW03033USEN
ECM
2014-08-14
http://www.ibm.com/common/ssi/ecm/se/en/sew03033usen/index.html
en
2014-08-14
White Papers
WH
SEW03033USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03033USEN
SEW03033USEN.PDF
1 MB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03033USEN&attachment=SEW03033USEN.PDF
Selecting a Managed Security Services Provider: The 10 most important criteria to consider (White paper (external)-USEN)
This white paper outlines a strategic approach to selecting a managed security services provider and establishes 10 of the most important qualifications to consider in choosing a provider.
en
Sales Support Material
SA
SEW03026USEN
ECM
2014-08-14
http://www.ibm.com/common/ssi/ecm/se/en/sew03026usen/index.html
en
2014-08-14
White Papers
WH
SEW03026USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03026USEN
SEW03026USEN.PDF
1 MB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03026USEN&attachment=SEW03026USEN.PDF
The challenge of protecting critical data (White paper (external)-USEN)
The IBM Critical Protection for the Crown Jewels whitepaper helps enterprises understand how IBM can help them identify and protect their most critical business information over the full data lifecycle—from acquisition to disposal.
en
Sales Support Material
SA
SEW03040USEN
ECM
2014-05-06
http://www.ibm.com/common/ssi/ecm/se/en/sew03040usen/index.html
en
2014-05-06
White Papers
WH
SEW03040USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03040USEN
SEW03040USEN.PDF
926 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03040USEN&attachment=SEW03040USEN.PDF
IBM Security Services cyber security intelligence index for retail (White paper (external)-USEN)
A white paper providing insights into current cyber threats against the retail industry based on IBM data collected from monitoring client security devices and addressing cyber security incidents.
en
Sales Support Material
SA
SEW03037USEN
ECM
2013-11-19
http://www.ibm.com/common/ssi/ecm/se/en/sew03037usen/index.html
en
2013-11-19
White Papers
WH
SEW03037USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03037USEN
SEW03037USEN.PDF
1 MB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03037USEN&attachment=SEW03037USEN.PDF
IBM Security Services Cyber Security Intelligence Index report
This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber ...
en
Sales Support Material
SA
SEW03031USEN
ECM
2013-11-15
http://www.ibm.com/common/ssi/ecm/se/en/sew03031usen/index.html
en
2013-11-15
White Papers
WH
SEW03031USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03031USEN
SEW03031USEN.PDF
586 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03031USEN&attachment=SEW03031USEN.PDF
IBM Security Services cyber security intelligence index: energy and utilities (White paper (external)-USEN)
This white paper provides insights into the current threat landscape for energy and utilities. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security ...
en
Sales Support Material
SA
SEW03036USEN
ECM
2013-10-03
http://www.ibm.com/common/ssi/ecm/se/en/sew03036usen/index.html
en
2013-10-03
White Papers
WH
SEW03036USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03036USEN
SEW03036USEN.PDF
1 MB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03036USEN&attachment=SEW03036USEN.PDF
Defending against increasingly sophisticated DDoS attacks (White paper (external)-USEN)
This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
en
Sales Support Material
SA
SEW03035USEN
ECM
2013-08-30
http://www.ibm.com/common/ssi/ecm/se/en/sew03035usen/index.html
en
2013-08-30
White Papers
WH
SEW03035USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03035USEN
SEW03035USEN.PDF
735 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03035USEN&attachment=SEW03035USEN.PDF
IBM Security Services cyber security intelligence index for financial services (White paper (external)-USEN)
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber ...
en
Sales Support Material
SA
SEW03034USEN
ECM
2013-08-27
http://www.ibm.com/common/ssi/ecm/se/en/sew03034usen/index.html
en
2013-08-27
White Papers
WH
SEW03034USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03034USEN
SEW03034USEN.PDF
1 MB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03034USEN&attachment=SEW03034USEN.PDF
Securing mobile devices in the business environment (White paper (external)-USEN)
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
en
Sales Support Material
SA
SEW03027USEN
ECM
2011-11-08
http://www.ibm.com/common/ssi/ecm/se/en/sew03027usen/index.html
en
2011-11-08
White Papers
WH
SEW03027USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03027USEN
SEW03027USEN.PDF
858 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03027USEN&attachment=SEW03027USEN.PDF
Strategies for assessing cloud security
To fully benefit from cloud computing, clients must ensure that data, applications and systems are properly secured. IBM offers end-to-end solutions that enable a business-driven and holistic approach to quantifying security risks and protecting cloud ...
en
Sales Support Material
SA
SEW03022USEN
ECM
2010-11-15
http://www.ibm.com/common/ssi/ecm/se/en/sew03022usen/index.html
en
2010-12-02
White Papers
WH
SEW03022USEN
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03022USEN
SEW03022USEN.PDF
280 KB
http://www.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03022USEN&attachment=SEW03022USEN.PDF