What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

How does IBM deliver cloud security?: Whitepaper

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and de-provisioning environment while experiencing the loss of direct control of security compliance, and privacy parameters.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Effects of Unexpected Power Interruptions on Embedded Flash Media: Whitepaper

Use of NAND flash storage continues to proliferate throughout many industrial segments and applications due to declining costs per gigabyte, high performance, and low power requirements. However, one of the main challenges of current NAND flash technology is its susceptibility to data corruption during unexpected power loss. This white paper seeks to explain the specific effects of unexpected power failure on flash media, as well as highlight “best practices” for mitigating data corruption as a result of power loss.


5 Hybrid Cloud Starting Points: Whitepaper

Did you know that more than 50% of organizations are already using or planning a move to hybrid cloud? And that these same IT leaders expect to double their hybrid cloud budget over the next two years? VMware customers are seamlessly extending their on-premises data center built on the trusted foundation of VMware vSphere® to hybrid cloud. Take a look at the top five most common ways you can get started with hybrid cloud migration within your organization.


Detailed Mapping of Vormetric Data Security Platform Controls to NIST 800-53 Requirements: Whitepaper

Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.