Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Protecting IT: Triumfant vs. The Competition

by TriumfantOct 01, 2015

Gain access to this collection of competitive briefs where you will gain insights into technology and business practices related to cybersecurity and solutions for protecting your IT assets.

2015 Threat Brief

by WebrootOct 01, 2015

Are you prepared for the next wave of malware, viruses, and threats? With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other smaller breaches, the trend shows no signs of slowing down. Download your complimentary copy of the Webroot 2015 Threat Brief to learn more about the biggest cyber threats of the last year, the latest discoveries by our Threat Research team, and how you can protect your business against data loss and

Anticipating Cyber Vulnerability Exploits Using Machine Learning

by Recorded FutureSep 30, 2015

Do you want to anticipate cyber exploits? With so many threats and exploits in the wild, its difficult to know which vulnerabilities will result in an actual exploit and cause harm. Making early assessments can help security managers discover possible threats in advance and prioritize vulnerability management. In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data. The report is now available to the

Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

by Bit9Sep 28, 2015

Use threat intelligence to beat advanced threats. Learn how incident responders can utilize automation and a recorded history to improve response processes and procedures over time.

50 Shades of Dark

by Recorded FutureJun 01, 2015

There is a lot of talk about the Dark Web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

Using open source intelligence (OSINT), our team explored the Surface, Deep, and Dark parts of the Web and investigated the links between them.

Download this white paper to learn: What the Dark, Deep, and Surface Web really are and why your information security team should care. How stolen

Anticipating Cyber Attacks

by Recorded FutureJun 01, 2015

Advanced cyber attackers are winning the race against defenders. To regain the lead, organizations must forecast attacks before they are impacted.

Anticipating cyber attacks allows you to proactively defend your organization rather than perform expensive and reactive incident response, which can include everything from deep forensics to throwing out millions of dollars worth of security infrastructure. And not to mention massive reputation repair campaigns.

This white

Patch Tuesday

by MalwarebytesSep 24, 2015

Each month, IT managers look forward to Patch Tuesday with a mixture of suspense and fear. What patches will be available? How will it impact their systems? As new malware threats become more advanced-from zero-day exploits to reverse-engineered patches-Patch Tuesday is proving to be an ineffective security solution on its own.

Up and to the Right: ICS/SCADA Vulnerabilities by the Numbers

by Recorded FutureSep 24, 2015

ICS attacks are growing ... fast. Industrial control systems (ICS) and SCADA systems are subject to cyber attack, just like any digitally connected system. Because the potential devastation is so high, Recorded Future conducted a study to learn more about the risks. Our aim in this study was to understand the available and known capabilities for attacks on ICS systems. What we found was a worrying trend of ICS exploits available and ready to be exploited.

Discovering & Remediating Malicious Attacks

by TriumfantSep 22, 2015

Today's reality demands a change in thinking from prevention (shield) to discovery and rapid remediation in response to the attacks that evade prevention technologies. Organizations are being successfully attacked at a frequency that is unacceptable by any standard.

Five Important Questions to Ask Before You Renew With Your Existing Backup Software Provider

by CommVaultSep 16, 2015

Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages. Assess your options based on these five questions before making this critical decision.



Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations' endpoints and servers, making it easier to see--and immediately stop--those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what's happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable.


CommVault is a software company relentlessly focused on all things data. We are dedicated to providing organizations worldwide with a radically better way to protect, manage and access data and information.


Headquarters: San Jose CA 95113

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why more than 50,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts

Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.


Headquarters: Rockville, Maryland

Triumfant's advanced analytics and intelligent, precision-based technology enable us to detect, analyze and immediately resolve attacks that bypass traditional, signature-based defenses. Self-learning and continuously evolving, Triumfant's endpoint protection technologies pick up where others leave off-effectively closing the gaps left by firewall, antivirus, sandbox technologies and Intrusion Prevention Systems. Triumfant not only captures data and detects malicious activity in real time, but it also verifies, contains, investigates, remediates and prevents future attacks.