Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Best Security Research of Q3 2015 - Infographic

by RiskIQOct 05, 2015

Busy during Q3? Don't worry! Here's an infographic linking to the most interesting and important security research released over the last quarter.

DocuSign Uses RiskIQ's Digital Footprint Solution to Keep Customers Safe and Maintain Secure, Trusted Reputation

by RiskIQOct 05, 2015

Learn how fellow security pros are using RiskIQ to combat today's customer facing threats. DocuSign CISO, Vanessa Pequeros, discusses how RiskIQ enables her team to detect threats outside of the firewall.

Why You Need to Protect Your Customers' Online Experience in Real-Time

by RiskIQOct 05, 2015

A whopping 69% of consumers have left websites because of security concerns. In the age of the consumer, brands must remain focused to protect their users from cyber threats. Learn how you can make a difference.

Enable Your Security Team to Manage Assets Outside Your Firewall

by RiskIQOct 05, 2015

The number of websites, social assets, and mobile apps you must secure usually far exceed the inventory your company has on record. Learn how you can discover previously unaccounted for websites, social assets, and mobile apps using RiskIQ's Enterprise Digital Footprint solution.

Brand Security and the CISO: Safeguarding Your Company's Critical Digital Footprint

by RiskIQOct 05, 2015

Strengthen your expertise on cyber threats endangering your company's brand and customers by viewing this webinar featuring Forrester Analyst, Nick Hayes, and RiskIQ VP of Product Strategy, Arian Evans.

SANS Survey: Incident Response Capabilities Needed

by Bit9Oct 05, 2015

Today's cybercriminals have learned to be patient, harvest more data, and cause significant security and financial effects. Because of this, organizations must detect and respond to incidents as quickly, efficiently and accurately as possible.

Protecting IT: Triumfant vs. The Competition

by TriumfantOct 01, 2015

Gain access to this collection of competitive briefs where you will gain insights into technology and business practices related to cybersecurity and solutions for protecting your IT assets.

2015 Threat Brief

by WebrootOct 01, 2015

Are you prepared for the next wave of malware, viruses, and threats? With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other smaller breaches, the trend shows no signs of slowing down. Download your complimentary copy of the Webroot 2015 Threat Brief to learn more about the biggest cyber threats of the last year, the latest discoveries by our Threat Research team, and how you can protect your business against data loss and

Anticipating Cyber Vulnerability Exploits Using Machine Learning

by Recorded FutureSep 30, 2015

Do you want to anticipate cyber exploits? With so many threats and exploits in the wild, its difficult to know which vulnerabilities will result in an actual exploit and cause harm. Making early assessments can help security managers discover possible threats in advance and prioritize vulnerability management. In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data. The report is now available to the

Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

by Bit9Sep 28, 2015

Use threat intelligence to beat advanced threats. Learn how incident responders can utilize automation and a recorded history to improve response processes and procedures over time.



Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations' endpoints and servers, making it easier to see--and immediately stop--those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what's happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable.

Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.


Headquarters: San Francisco, CA

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers, inventories and monitors managed, unmanaged and rogue web and mobile assets. This "Enterprise Digital Footprint" is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud.


Headquarters: Rockville, Maryland

Triumfant's advanced analytics and intelligent, precision-based technology enable us to detect, analyze and immediately resolve attacks that bypass traditional, signature-based defenses. Self-learning and continuously evolving, Triumfant's endpoint protection technologies pick up where others leave off-effectively closing the gaps left by firewall, antivirus, sandbox technologies and Intrusion Prevention Systems. Triumfant not only captures data and detects malicious activity in real time, but it also verifies, contains, investigates, remediates and prevents future attacks.