Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


A New Guide to Evaluating Managed Security Services Providers

by United LexOct 08, 2015

In 2015, more than 1.1 billion records were exposed in data breaches, according to Goldman Sachs. The Ponemon Institute says the average cost of a data breach worldwide is $3.79 million per incident (mega breaches omitted), and rising. This comes at a time when more and more companies are increasing spending on managed security services providers (MSSPs). So what is happening? Traditional MSSPs boast all the latest technology, yet they struggle to detect unknown threats and do not

Converge or Collide? Time for Legal and Compliance Staff to Tune into Cyber Risk Management

by United LexOct 08, 2015

As data breaches dominate newsrooms and board rooms pressure on attorneys and compliance staff to develop information security management programs has reached unprecedented levels. Yet, traditional siloed infrastructures can inhibit collaboration between information security and legal, which is critical to solving challenges for both departments. For example, IT may not fully comprehend the scope or ramifications of a breach based on the data compromised , whereas legal, which is involved in

Market Guide for User and Entity Behavior Analytics

by Bay DynamicsOct 08, 2015

UEBA successfully detects malicious and abusive activity that otherwise goes unnoticed, and effectively consolidates and prioritizes security alerts sent from other systems. Download This Research Report.

Five Most Common Types of Malicious Hackers

by WebsenseOct 08, 2015

The arms dealer, the banker, the contractor, the online anarchist, the special agent-these are the individuals and groups attempting to break corporate and personal security. Are they all trying to steal credit card information, or are there other targets for their attacks? Knowing the types, intents and motivations of malicious hackers can help tailor security solutions more effectively. Read "Five Most Common Types of Malicious Hackers," for insights into the methods and drivers of the major

Endpoint Security Buyers Guide

by SophosOct 07, 2015

Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Deciphering the Code: A Simple Guide to Encryption

by SophosOct 07, 2015

With data breaches and accidental data loss hitting the headlines more than ever; the role of encryption in your security plan continues to grow in importance. This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution.

DocuSign Uses RiskIQ's Digital Footprint Solution to Keep Customers Safe and Maintain Secure, Trusted Reputation

by RiskIQOct 05, 2015

Learn how fellow security pros are using RiskIQ to combat today's customer facing threats. DocuSign CISO, Vanessa Pequeros, discusses how RiskIQ enables her team to detect threats outside of the firewall.

Best Security Research of Q3 2015 - Infographic

by RiskIQOct 05, 2015

Busy during Q3? Don't worry! Here's an infographic linking to the most interesting and important security research released over the last quarter.

Why You Need to Protect Your Customers' Online Experience in Real-Time

by RiskIQOct 05, 2015

A whopping 69% of consumers have left websites because of security concerns. In the age of the consumer, brands must remain focused to protect their users from cyber threats. Learn how you can make a difference.

Enable Your Security Team to Manage Assets Outside Your Firewall

by RiskIQOct 05, 2015

The number of websites, social assets, and mobile apps you must secure usually far exceed the inventory your company has on record. Learn how you can discover previously unaccounted for websites, social assets, and mobile apps using RiskIQ's Enterprise Digital Footprint solution.


Bay Dynamics

Headquarters: San Francisco

Bay Dynamics is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose--built Risk Fabric platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders and vendors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

Contact Us


Headquarters: San Francisco, CA

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers, inventories and monitors managed, unmanaged and rogue web and mobile assets. This "Enterprise Digital Footprint" is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud.


More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile and network security backed by SophosLabs - a global network of threat intelligence centers. Sophos is headquartered in Boston, US and Oxford, UK. www.Sophos.com

United Lex

Headquarters: 6130 Sprint Parkway, Suite 300 Overland Park, Kansas 66211

UnitedLex is a global leader in legal and data solutions with a singular mission to improve the performance of leading corporations, law firms and academic institutions. UnitedLex provides unparalleled solutions resulting in risk mitigation, efficiency improvements and cost optimization for its clients in North America, Europe and Asia including offerings such as Questio, a managed service that changes the traditional approach to eDiscovery and data management. UnitedLexs more than 1,800 attorneys, engineers and consultants focus on the broadly defined areas of litigation, contracting and intellectual property to drive seven and eight figure benefits to its clients. Founded in 2006, and with more than $250 million in assets and committed capital, UnitedLex deploys the right blend of service and technology in supporting the world's leading corporations and law firms. UnitedLex is committed to empowering legal leadership in the design, build and execution of a spectrum of solutions in line with their immediate and long term objectives. The key differentiators that distinguish UnitedLex are: Global professionals united by a passion for excellence Globally integrated consulting, technology and outsourcing capability from state of the art facilities Analytics expertise simplifying and unleashing the power of legal analytics Extensive depth and breadth of service offerings Significant investment in security, six sigma process templates and technology innovation UnitedLex University includes the industry's most comprehensive training program and IP repository Domain centric and proven management team


Websense, Inc. (NASDAQ: WBSN) is a global leader in protecting organizations from the latest cyberattacks and data theft. Websense� TRITON� comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.