TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

AlienVault® USM™ Anywhere in Azure Environments

by AlienVaultJul 26, 2017

AlienVault USM Anywhere is a unified security monitoring solution that provides centralized threat detection and incident response for your cloud and on-premise IT infrastructure and applications. With purpose-built cloud sensors for Microsoft Azure and AWS public clouds as well as VMware and Hyper-V virtual appliance sensors to monitor your on-premise virtual and physical infrastructure, USM Anywhere delivers complete security visibility of all your critical infrastructure from a single SaaS

  • Alienvault
  • Security Monitoring
  • Network & Perimeter Security
  • Details

The DomainTools Report: Spring 2017 Edition

by DomainToolsJul 25, 2017

For this report we re-ran some of our original analyses to see how the world has changed -- or stayed the same -- since publication of our first report in the spring of 2015. By identifying trends, we may be able to turn to extrapolate from them to develop high-level predictions about how threat actors may use internet infrastructure in the future.

  • DomainTools
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Case Study: Fortune 15 Enterprise Company - Threat Intel with Iris

by DomainToolsJul 25, 2017

Read how a Fortune 15 Technology Enterprise proactively detected advanced threats with DomainTools

  • DomainTools
  • Database Security
  • Cloud Security
  • Details

DNS Forensics: Where Intuition Meets Experience

by DomainToolsJul 25, 2017

It has become a business imperative to proactively defend against cyber threats. Any organization that transacts digitally with employees, clients and suppliers, while storing sensitive data, on premises or in the cloud, must inevitably come to grips with this truism of the digital age. Today most large enterprises make prodigious investments in complex, layered defenses; and most small and mid-sized business, when pressed, will acknowledge that attaining their grown objectives hinges on

  • DomainTools
  • Cybersecurity
  • Security Management & Analytics
  • Details

Survey Report: Cyber Threat Intelligence Uses, Successes and Failures

by DomainToolsJul 25, 2017

Read about trends and best practices in this SANS 2017 CTI survey

  • DomainTools
  • Security Management & Analytics
  • Cybersecurity
  • Details

Cyber Threats on a Path to Destruction

by BluVectorJul 24, 2017

Destructive malware is the latest advancement in malware. This type of malware can easily destroy your network and data. Learn more about it.

  • BluVector
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Detect Next-Gen Threats with Modern Security Intelligence

by ExabeamJul 18, 2017

Security management is broken. This white paper explores how Exabeam addresses the weaknesses of SIEM.

  • Exabeam
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details

Prevent Insider Threats with User and Entity Behavior Analytics

by ExabeamJul 18, 2017

Malicious insiders are a common cause of data loss. Learn how UEBA helps identify early patterns of risky behavior.

  • Exabeam
  • Security Management & Analytics
  • Security
  • Security Monitoring
  • Details

CISOs Investigate: User Behavior Analytics

by ExabeamJul 18, 2017

This Security Current research report, authored by CISOs, offers real-world use cases and buyer guidance for UEBA.

  • Exabeam
  • Security Management & Analytics
  • Security Monitoring
  • Details

Step-by-Step Incident Response for Today’s Top 3 Security Scenarios

by ExabeamJul 18, 2017

Security incidents require investigation and remediation. How do you avoid reinventing the wheel? Read the white paper.

  • Exabeam
  • Security Management & Analytics
  • Security Monitoring
  • Details