Techworld

White Papers: IBM


Sort by: Date | Company | Title


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Fraud in Insurance
By IBM | 26/9/2013
Cunningham Lindsey, a leading claims management company that specializes in fraud, not only uncovered an organized fraud ring but also established an efficient process for helping their insurance customers identify legitimate claims from the fraudulent ones. In this case study, find out how possible fraudulent claims were flagged, leading to the discovery of a criminal fraud.
Download this now


Defeating External and Internal Fraud
By IBM | 26/9/2013
The amount of money lost to fraud a year is staggering:globally, organisations lose 5% or $2.9 trillion in revenue annually. Today's fraud is committed on electronic networks at lightning speed by global rings of criminals, terrorists and insiders using sophisticated methods hidden in complex layers of transactional data. Download to find out how to empower analysts to search multiple data sources simultaneously to visualise transactions and timelines.
Download this now


Fraud Intelligence Analysis
By IBM | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Fighting Fraud with Big Data
By IBM | 26/9/2013
For industries with a full-time focus on fighting fraud, intelligence is invaluable. Whilst the annual cost of fraud is substantial and the benefits of reducing it are very real, we find that enterprises with proactive and predictive approaches to fighting fraud have a greater visibility and intelligence of possible fraud. Click to find out more.
Download this now


Delivering Continuous Compliance and Reducing Risk
By IBM | 30/7/2013
As organisations strive to securely deliver high-quality, high-availability services to their user communities, they need to grapple with the cost control and ever-changing user populations, access points, and applications. But that is only part of a larger challenge related to identity and access management (IAM). As the importance of services being delivered solely to the right people, with the right privileges, this is becoming more difficult to achieve. Click to download!
Download this now


The Magic Quadrant for Security Information and Event Management
By IBM | 29/7/2013
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. In this whitepaper, we look at how different vendors meet the requirements of improving their threat intelligence and security analytics. Click to download!
Download this now


Emerging Security Trends and Risks
By IBM | 29/7/2013
Many of the traditional security threats that have been prevalent over the last several years are continuing to evolve and spread. Because it is unrealistic to avoid new connection-enabling technologies, business executives can address emerging security risks by: building a proactive security intelligence capability; developing a unified view of all endpoints, including mobile devices; protecting information assets at the database level; and creating safer social habits. Read on to find out more about these emerging security trends and risks.
Download this now


A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
By IBM | 26/7/2013
The tremendous growth of data has created unprecedented challenges for businesses security. Striking a balance between opportunity and reputational risk requires a comprehensive strategy that incorporates business resiliency with dependable backup and restore policies for systems and processes. Find out more!
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers