UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Automotive Ethernet Compliance Testing

by Rohde & SchwarzMay 22, 2015

With the introduction of Ethernet in cars, a new class of interface quality tests is required. The OPEN alliance has released a test specification for BroadR-Reach Ethernet. The compliance test focuses similar to most Ethernet compliance test specifications of the IEEE on transmitter quality. In this webinar, details will be provided on the individual test cases of the compliance test as well as hints on the required test setup. What you will learn by attending the webinar: BroadR-Reach

  • Ethernet equipment
  • Test & measurement
  • Details

GUIs for the Internet of Things: 3 Secrets to IoT Success

by AltiaMay 22, 2015

IoT devices are different than phones and tablets, so you cannot use the same GUI strategy. If you try, your product will die on the shelf. Dedicated IoT devices are designed to meet a very specific set of requirements – and each application is different. Designing IoT devices with the needs and goals of the user in mind is critical. How do you avoid disaster and capture the massive IoT market opportunity? Join Altia for our 30 minute live webinar event -- "3 Common GUI Mistakes That

  • Components
  • Hardware
  • Software
  • Details

Risk Mitigation: Keeping employee risk from becoming insider threat

by SpectorSoft CorporationMay 22, 2015

This White Paper will present some common sense suggestions for improving the "beginning of the lifecycle" risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we'll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.

  • SpectorSoft Corporation
  • Security Monitoring
  • Endpoint Security
  • Details

Insider Threats and the Need for Fast and Directed Response

by SpectorSoft CorporationMay 22, 2015

As breaches continue to cause significant damage to organizations, security consciousness is shifting from traditional perimeter defense to a holistic understanding of what is causing the damage and where organizations are exposed. Although many attacks are from an external source, attacks from within often cause the most damage. This report looks at how and why insider attacks occur and their implications.

  • SpectorSoft Corporation
  • Security Monitoring
  • Endpoint Security
  • Details

Securosis: Security and Privacy on the Encrypted Network

by Blue CoatMay 22, 2015

Get sound advice from Securosis, a specialist in information security research and analysis. Read the new white paper, "Security and Privacy on the Encrypted Network," that explores multiple issues of securing the encrypted network.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

Encrypted Traffic Management E-Guide

by Blue CoatMay 22, 2015

According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

ESG: Network Encryption and Security

by Blue CoatMay 22, 2015

Enterprise organizations are encrypting more of their network traffic. This is a mixed blessing in that it can protect data confidentiality and integrity but it also opens a camouflaged threat vector back into the organization. This New study from ESG describes the growth of encryption and strategies for protection.

  • Blue Coat
  • Security Monitoring
  • Endpoint Security
  • Details

Encrypted Traffic Management for Dummies eBook

by Blue CoatMay 22, 2015

Malware hiding in SSL/TLS has become an urgent priority for security executives. It's time for a better approach to manage encrypted traffic. Read "Enterprise Traffic Management for Dummies," a new e-book brought to you by Blue Coat.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

Market Overview: Vulnerability Management

by NopSecMay 21, 2015

Exploiting vulnerabilities in applications, browsers, and operating systems is often the first step in compromising a target. Research demonstrates that staying on top of new threats and vulnerabilities was a top priority for technology decision makers in 2014 and for the three years prior. But despite increased investment, security and risk professionals continue to struggle with addressing them.

This analyst report by Forrester takes a look at the current state of vulnerability

  • Risk Management/Security
  • Security Monitoring
  • Details

Vulnerability Threat Management in 2015

by NopSecMay 21, 2015

In recent years, vulnerability threat management has become merely a means to help document system compliance with industry or government regulations. Between existing technologies creating information overload and an extensive list of manual tasks, the remediation process has broken down. In some industries, the average time to fix a vulnerability is 176 days. As a result, the window of opportunity for hackers remains wide open.

Download the latest report from 451 Research and

  • Risk Management/Security
  • Security Management & Analytics
  • Details