Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Data Analytics with Hadoop: O'Reilly Ebook

by ZaloniAug 18, 2016

This book is meant as a survey of the Hadoop ecosystem and distributed computation intended to arm data scientists, statisticians, programmers, and folks who are interested in Hadoop with just enough knowledge to make them dangerous.

Use this book as a guide as you dip your toes into the world of Hadoop and find the tools and techniques that interest you the most, be it Spark, Hive, Machine Learning, ETL, Relational Databases, or one of the other many topics related to cluster

Data Sciences Services

by ZaloniAug 18, 2016

Data science is the art and science of creating business value from big data. For today's enterprises, data science is critical for creating competitive advantage, such as improving operational efficiencies or developing new products and services.

6 Easy Ways to Advance Your Cybersecurity Team

by ThreatConnectAug 17, 2016

In this paper, you will learn six easy steps you can take to enhance your ability to ingest, store, and prioritize threat data, develop intelligence-driven processes to automate manual tasks, and streamline your work flow. The right platform (and processes you drive with it) can be a force-multiplier for your small team.

Gartner Report: The Five Models of Security Operation Centers

by Arctic WolfAug 16, 2016

Gartner outlines the five models of Security Operation Centers and provides practical guidance to CISOs planning to build a SOC capability.

Managed Detection and Response Stops Ransomware

by Arctic WolfAug 16, 2016

Why Managed Detection and Response (MDR) is key to stopping the ransomware epidemic.

FAQ: Managed Detection and Response

by Arctic WolfAug 16, 2016

Frequently asked questions about MDR and how it is different from MSSP.

Gaining a security operations center for less than the cost of a full-time security engineer

by Arctic WolfAug 16, 2016

How Threshold implemented a state-of-the-art security operations center for less than the cost of one full-time employee.

Costa protects its fast-growing online business with vigilant cybersecurity

by Arctic WolfAug 16, 2016

Why Costa trusts AWN CyberSOC to protect its fast-growing online business.

Why Your Business Needs Enterprise-Strength Password Management

by Keeper SecurityAug 15, 2016

Learn about the history of the password, best practices and why businesses need enterprise-strength password management.

For over a half a century, the password, a secret sequence of characters known only to the authorized user, provided computer access security. Now, well into the second decade of the 21st century, the venerable password is no longer adequate. At least not in its current form.

This whitepaper discusses the emergence of the password as the primary

5 Blind Spots that Kill Cybersecurity

by ProtectWiseAug 12, 2016

Learn how Retrospection gives Information Security Practitioners the assurance they need to quickly mitigate threats.


Arctic Wolf

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as-a-service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.

Keeper Security

Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft. As the leading password manager and digital vault, Keeper helps millions of people and thousands of businesses substantially mitigate the risk of a data breach. Keeper is SOC 2 Certified and utilizes best-in-class encryption to safeguard its customers. Keeper protects industry-leading companies including Sony, Chipotle, and The University of Alabama at Birmingham.


Headquarters: 1555 Blake Street, Suite 450, Denver, CO 80202

ProtectWise; is disrupting the security industry by providing a pervasive view of the network, layered with refined analytics and a clear interface that enables high performance threat hunting and accelerated incident response. The ProtectWise Grid&trade, combines unlimited visibility and the detection of complex threats that develop over time, giving the security team the strategic advantage to stop attacks before they reach their goal. By harnessing the power of the cloud, ProtectWise has the unique ability to create an unlimited retention window with full-fidelity forensics, automated retrospection and advanced visualization-all with the ease and cost-savings of an on-demand deployment model.


ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way. More than 1,200 companies and agencies worldwide use ThreatConnect to maximize the value of their security technology investments, combat the fragmentation of their security organizations, and enhance their infrastructure with relevant threat intelligence. To register for a free ThreatConnect account, or to learn more about our products and services, visit:


Zaloni, the data lake company, is an award-winning provider of enterprise data lake management solutions. Our software, Bedrock and Mica, enables customers to gain their own competitive advantage through organized, actionable big data lakes. Serving the Fortune 500, Zaloni has helped its customers build production implementations at many of the world's leading companies.