TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Frost & Sullivan: What you SIEM is what you get

by AlienVaultJan 05, 2018

Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion.

In this analyst report from Frost & Sullivan, you'll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You'll


Cyber threats are growing at an alarming rate. Get the protection you need to build an effective security strategy.

by GRA QuantumJan 04, 2018

As dependency on digital infrastructures grow, vulnerabilities rise. What do companies stand to lose that don't take proper precautions?


The Future of Cyber Regulation: New York’s Cyber Security Rules for the Finance and Insurance Industry

by GRA QuantumJan 04, 2018

Banks, insurance companies, and other financial services institutions are now required to meet the standards of the 23 NYCRR Part 500 regulations.

Are you keeping up on the evolving NYFS regulations?


See how penetration testing helped a CISO overhaul his company’s security strategy.

by GRA QuantumJan 04, 2018

See how security leadership of an asset management firm leveraged a comprehensive penetration test to develop a realistic budget proposal for an effective cyber security strategy.


NSS Labs’ Breach Prevention Summary Report

by Check Point Software Technologies Ltd.Dec 26, 2017

NSS Labs' Breach Prevention Summary Report presents test results for Check Point's 15600 Next Generation Threat Prevention & SandBlast™ appliance. Tests revealed a 100% block rate for all 7 types of exploits and malware tested.


The Next Attack Can Be Prevented

by Check Point Software Technologies Ltd.Dec 26, 2017

This white paper delivers fresh insights into how cyber threats have intensified. Building on this analysis, the white paper gives practical recommendations for improving cyber security by adopting prevention-based technology and practices.


Cyber-Attack Security Guide

by Check Point Software Technologies Ltd.Dec 26, 2017

Cyber Security with Intention, An Executive Guide gives C-level executives and other decision makers high-level explanations of cyber security issues, misconceptions, and the best practices for preventing costly cyber-attacks.


Ransomware Can Be Prevented

by Check Point Software Technologies Ltd.Dec 26, 2017

Ransomware is today's fastest growing and most destructive type of cyber-attack. This white paper gives readers a detailed understanding of ransomware and the measures needed to defeat this costly menace.


Customer Testimonials: Mississippi Secretary of State Gains End to End Advanced Threat Protection for Its Data

by Check Point Software Technologies Ltd.Dec 26, 2017

The Mississippi Secretary of State sought protection against advanced threats including ransomware, viruses, bots, zero-day attacks and others. This case study explores why they chose Check Point Sandblast Zero-Day Protection and how it fulfilled expectations.


Threat Hunting for Dummies

by Carbon BlackDec 22, 2017

This eBook introduces the advanced cybersecurity practice of threat hunting and the role it plays in protecting your organization. Find out how security experts always stay one step ahead of even the most sophisticated attackers.

You'll learn how threat hunting works, why it's an essential component in an organization's security program, and how you can master the discipline in order to improve the security of your organization and advance your career.


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


GRA Quantum

GRA Quantum is a pioneering information security firm founded upon the belief that every organization has the right to keep their data private and secure.

Our mission is to build close partnerships with our clients, serving them not as just a vendor, but as trusted advisors helping them to build effective, proactive plans.

Our focus is always on both the technical and human elements within an organization. We believe in comprehensive strategies designed to harden networks, deflect attackers, and rapidly recover from any accidents.

As technology progresses, so too do our tactics, ensuring our experts are always prepared to serve forward-looking leaders eager to stay ahead of emerging threats.