TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to Build a Security Operations Center (on a Budget)

by AlienVaultSep 25, 2018

Get all 5 chapters of AlienVault's How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

The chapters you'll read focus on:
• The roles and responsibilities involved in a security operations team
• The key processes

  • Alienvault
  • Security Monitoring
  • Security Management & Analytics
  • Details

Beginner's Guide to Ransomware Prevention & Detection

by AlienVaultSep 25, 2018

If you haven't had first-hand experience with ransomware in the past, chances are you've heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year.

In this whitepaper, we'll cover ransomware basics and provide best practices for ransomware prevention and detection.

  • Alienvault
  • Security Monitoring
  • Cybersecurity
  • Details

Beginner's Guide to Threat Intelligence

by AlienVaultSep 25, 2018

A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus on scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answer.

In this AlienVault beginner's guide, you'll learn about:

• Different threat intelligence sources
• Why threat intelligence is critical for threat detection
• The benefits of threat

  • Alienvault
  • Security Management & Analytics
  • Security Monitoring
  • Details

Beginner's Guide to Brute Force & DDoS Attacks

by AlienVaultSep 25, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force

  • Alienvault
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Email and the Web - Go Great Together for Attackers, But What About for the Defenders?

by Mimecast North America, Inc.Sep 25, 2018

According to the Verizon Data Breach Investigations Report 2018, 92% of malware, such as ransomware, trojans, and RATs were delivered via malicious email attachments, with most of the remainder delivered via the web.

With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their malicious work? And how you

  • Security Management & Analytics
  • Details

Open Source Network Security Tools for Beginners

by AlienVaultSep 25, 2018

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

In this whitepaper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

You'll learn about using open source tools for:

• Network discover
• Network IDS
• Vulnerability scanning

  • Alienvault
  • Network & Perimeter Security
  • Security platforms
  • Details

The Forrester Tech Tide on Everything You Need to Implement a Zero Trust Strategy

by CyxteraSep 21, 2018

Read the complimentary Forrester analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention.

  • Cyxtera
  • Infrastructure
  • Data centers
  • Details

Definitive Guide to Software-Defined Perimeters

by CyxteraSep 21, 2018

Today's network security reality has changed. It's time for an identity-centric, zero-trust approach and it's called a Software-Defined Perimeter. The Definitive Guide discusses the core principles of SDP, the technical architecture - 'authenticate-first, connect second,' and uses cases. Learn more about the most comprehensive SDP solution in the market that goes beyond the SDP-spec to provide an adaptive, identity-centric full network platform built for the hybrid enterprise.

  • Cyxtera
  • Infrastructure
  • Data centers
  • Details

How VPNs and Firewalls Put You at Risk

by CyxteraSep 21, 2018

Security threats, employee work habits, and IT infrastructure have all changed to make VPNs and Firewalls less relevant -- and potentially even dangerous -- to your organization.

  • Cyxtera
  • Infrastructure
  • Data centers
  • Details

Are Your Network Users Over-Privileged?

by CyxteraSep 21, 2018

Businesses today protect against all sorts of cyber threats - hackers, malicious insiders, inadvertent actors, and even state-sponsored cyber attacks. One category that often goes underrepresented in conversations about prevention is privileged users. Are your network users over-privileged?

  • Cyxtera
  • Infrastructure
  • Data centers
  • Details