Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Market Guide for User and Entity Behavior Analytics

by Bay DynamicsOct 08, 2015

UEBA successfully detects malicious and abusive activity that otherwise goes unnoticed, and effectively consolidates and prioritizes security alerts sent from other systems. Download This Research Report.

Converge or Collide? Time for Legal and Compliance Staff to Tune into Cyber Risk Management

by United LexOct 08, 2015

As data breaches dominate newsrooms and board rooms pressure on attorneys and compliance staff to develop information security management programs has reached unprecedented levels. Yet, traditional siloed infrastructures can inhibit collaboration between information security and legal, which is critical to solving challenges for both departments. For example, IT may not fully comprehend the scope or ramifications of a breach based on the data compromised , whereas legal, which is involved in

Five Most Common Types of Malicious Hackers

by WebsenseOct 08, 2015

The arms dealer, the banker, the contractor, the online anarchist, the special agent-these are the individuals and groups attempting to break corporate and personal security. Are they all trying to steal credit card information, or are there other targets for their attacks? Knowing the types, intents and motivations of malicious hackers can help tailor security solutions more effectively. Read "Five Most Common Types of Malicious Hackers," for insights into the methods and drivers of the major

Best Security Research of Q3 2015 - Infographic

by RiskIQOct 05, 2015

Busy during Q3? Don't worry! Here's an infographic linking to the most interesting and important security research released over the last quarter.

DocuSign Uses RiskIQ's Digital Footprint Solution to Keep Customers Safe and Maintain Secure, Trusted Reputation

by RiskIQOct 05, 2015

Learn how fellow security pros are using RiskIQ to combat today's customer facing threats. DocuSign CISO, Vanessa Pequeros, discusses how RiskIQ enables her team to detect threats outside of the firewall.

Why You Need to Protect Your Customers' Online Experience in Real-Time

by RiskIQOct 05, 2015

A whopping 69% of consumers have left websites because of security concerns. In the age of the consumer, brands must remain focused to protect their users from cyber threats. Learn how you can make a difference.

Enable Your Security Team to Manage Assets Outside Your Firewall

by RiskIQOct 05, 2015

The number of websites, social assets, and mobile apps you must secure usually far exceed the inventory your company has on record. Learn how you can discover previously unaccounted for websites, social assets, and mobile apps using RiskIQ's Enterprise Digital Footprint solution.

Brand Security and the CISO: Safeguarding Your Company's Critical Digital Footprint

by RiskIQOct 05, 2015

Strengthen your expertise on cyber threats endangering your company's brand and customers by viewing this webinar featuring Forrester Analyst, Nick Hayes, and RiskIQ VP of Product Strategy, Arian Evans.

SANS Survey: Incident Response Capabilities Needed

by Bit9Oct 05, 2015

Today's cybercriminals have learned to be patient, harvest more data, and cause significant security and financial effects. Because of this, organizations must detect and respond to incidents as quickly, efficiently and accurately as possible.

Protecting IT: Triumfant vs. The Competition

by TriumfantOct 01, 2015

Gain access to this collection of competitive briefs where you will gain insights into technology and business practices related to cybersecurity and solutions for protecting your IT assets.


Bay Dynamics

Headquarters: San Francisco

Bay Dynamics is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose--built Risk Fabric platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders and vendors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

Contact Us


Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations' endpoints and servers, making it easier to see--and immediately stop--those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what's happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable.


Headquarters: San Francisco, CA

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers, inventories and monitors managed, unmanaged and rogue web and mobile assets. This "Enterprise Digital Footprint" is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud.


Headquarters: Rockville, Maryland

Triumfant's advanced analytics and intelligent, precision-based technology enable us to detect, analyze and immediately resolve attacks that bypass traditional, signature-based defenses. Self-learning and continuously evolving, Triumfant's endpoint protection technologies pick up where others leave off-effectively closing the gaps left by firewall, antivirus, sandbox technologies and Intrusion Prevention Systems. Triumfant not only captures data and detects malicious activity in real time, but it also verifies, contains, investigates, remediates and prevents future attacks.

United Lex

Headquarters: 6130 Sprint Parkway, Suite 300 Overland Park, Kansas 66211

UnitedLex is a global leader in legal and data solutions with a singular mission to improve the performance of leading corporations, law firms and academic institutions. UnitedLex provides unparalleled solutions resulting in risk mitigation, efficiency improvements and cost optimization for its clients in North America, Europe and Asia including offerings such as Questio, a managed service that changes the traditional approach to eDiscovery and data management. UnitedLexs more than 1,800 attorneys, engineers and consultants focus on the broadly defined areas of litigation, contracting and intellectual property to drive seven and eight figure benefits to its clients. Founded in 2006, and with more than $250 million in assets and committed capital, UnitedLex deploys the right blend of service and technology in supporting the world's leading corporations and law firms. UnitedLex is committed to empowering legal leadership in the design, build and execution of a spectrum of solutions in line with their immediate and long term objectives. The key differentiators that distinguish UnitedLex are: Global professionals united by a passion for excellence Globally integrated consulting, technology and outsourcing capability from state of the art facilities Analytics expertise simplifying and unleashing the power of legal analytics Extensive depth and breadth of service offerings Significant investment in security, six sigma process templates and technology innovation UnitedLex University includes the industry's most comprehensive training program and IP repository Domain centric and proven management team


Websense, Inc. (NASDAQ: WBSN) is a global leader in protecting organizations from the latest cyberattacks and data theft. Websense� TRITON� comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.