Articles Related to security products

Breach Prevention Does Not Work – Learn How to Secure the Breach!

Find out why security strategies must shift from a mindset of breach prevention to one of breach acceptance—one that understands data, not the perimeter. Download...

A Matter of National Security: BM.I Relies on SafeNet Encryption to Secure Storage

Learn more about this extensive and best-in-class security solution in “A Matter of National Security: BM.I Relies on SafeNet Encryption to Secure Storage”. Download...

Striking a Balance in Mobile Security – A Candid Survey of Federal Managers

“Striking a Balance for Mobile Security”, a joint research study by the Government Business Council and Samsung, to understand the additional concerns faced by...

The Evolution of the Enterprise…And Enterprise Security

This Whitepaper explores these and other trends, as well as how to address these challenges.

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Commencing with an overview of what VPNs are and how they benefit business, Remote-Access VPNs delves into the technology options and considerations for choosing...

Protecting Users Everywhere, All the Time. Customer Case Study

• Better, cost effective protection for 10,000 users in 90 offices worldwide • A reduction in time spent by IT in managing security, malware problems,...

The Changing Role of the CIO

Can CIOs successfully bridge the gap between ensuring security of company data while allowing   employees to bring their own devices?  Download this IDC...

Canadian security expert named IBM fellow

Sandy Bird transformed IBM’s QRadar from a network traffic anomaly detector into a security intelligence platform

Stay on op - Ge the daily news in your inbox