TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by SplunkJul 17, 2018

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this Dark Reading webinar, a top expert will offer some useful definitions of terms, and will discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT security staff


The Hacker-Powered Security Report 2018

by HackerOneAug 16, 2018

The 2018 Hacker-Powered Security Report Is The Most Comprehensive Report On Hacker-Powered Security.


What Generation is Your Cyber Security?

by Check Point Software Technologies Ltd.Apr 28, 2018

Learn about the evolution of threats from the 1st generation through generation 5 and discover what you must do to prevent today's mega cyber attacks from damaging your IT infrastructure and data.


2018 Security Report

by Check Point Software Technologies Ltd.Apr 28, 2018

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks. As the cyber landscape evolves, the World Economic Forum recently placed cyber attacks as one of the top three global risks for 2018.


Cyber Attack Trends 2018 Mid-Year Report

by Check Point Software Technologies Ltd.Aug 15, 2018

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.


The Forrester Wave™: Endpoint Security Suites, Q2 2018

by Check Point Software Technologies Ltd.Aug 15, 2018

This detailed technical report by acclaimed analyst firm Forrester compares the effectiveness of the top 15 endpoint security solutions. See how endpoint security products from leading vendors stack up under rigorous testing.


What is the Main Obstacle to Security?

by Check Point Software Technologies Ltd.Aug 15, 2018

Could staffing be cyber security's weak spot? Could business objectives be the problem? Read this research report to learn why most organizations' security is 2 to 3 generations out of step with today's threats.


3 Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuest LLCAug 14, 2018

Improve security and monitoring of AWS, Azure & Google Cloud.


The Log Parsing Challenge

by ReliaQuest LLCAug 14, 2018

Learn how to drive consistent security and unexpected value with log parsing


Overly Managed Security

by ReliaQuest LLCAug 14, 2018

In today's world of cybersecurity threats, the biggest challenge of all may be rethinking our approach.


SUBTOPICS:

Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


HackerOne

From implementing the basics of a vulnerability disclosure process to supercharging your existing security programs via a bug bounty program, HackerOne has you covered.


ReliaQuest LLC

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.