TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






IT Authorities Sees Increased Productivity

by VeriatoJan 19, 2017

IT Services Provider Sees Increased Productivity with Veriato 360 Employee Monitoring Software.


Building Hyper-Scale Data Centers at Hyper-Speed

by Cyrus OneJan 17, 2017

Learn how CyrusOne is "Building Hyper-Scale Data Centers at Hyper-Speed," and consider how your enterprise can leverage the benefits of CyrusOne's record-breaking speed-to market construction solutions.


Predictive Intelligence: Pre-crime For IT

by Cisco UmbrellaSep 15, 2016

Today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection. Therefore, it's essential to adopt new measures that neutralize these new threats.

Download this white paper to learn how a predictive IT strategy can help you prevent attacks before they're fully launched and stop command-and- control infiltrations before they do real harm.


4 Top Tips for Preventing and Mitigating Application Downtime

by Veeam SoftwareDec 15, 2016

By following a few simple rules, organizations can maintain the availability they need without breaking the bank.

How much would it cost your company if your IT systems were down for a few minutes? A few hours? What about a few days?

In our always-on digital economy, a significant unplanned outage could be enough to drive some organizations out of business. For others, the results of an outage may be far less dramatic. But although the cost of downtime varies from


Weathering an Insecure World

by Terbium LabsAug 26, 2016

Information security is in the midst of a major shift. What had been a purely technical, defensive, IT problem is now a whole-organization risk management problem. As the industry undergoes this wholesale shift in mindset, enterprises are struggling to catch up. Gone are the days of installing a few defensive products to feel relatively secure in its perimeter and would be understood by its investors, partners, and customers to have taken adequate precautions. The sophistication of threats and


Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes: Five Things Every Business Executive Should Know About Cybersecurity Why Poor Cyber Hygiene Invites Risk The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints Improving the Security Conversation for CIOs, CISOs, and Board Members Download the issue today!

The information submitted is collected by both UBM and our


Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats


Defend against injection attacks

by Rogue Wave SoftwareNov 09, 2016

As our reliability on software grows each day, it becomes imperative that we implement software in the most secure manner possible.

In this white paper we'll explore the risk of injection attacks, how to prevent these vulnerabilities in your software, and how static code analysis can help.


Replace AV with Cb Defense

by Carbon BlackNov 02, 2016

Learn why organizations are replacing traditional antivirus (AV) with next-generation AV (NGAV) offering simple to manage, full-spectrum prevention and advanced attack analytics.


White Paper: Replace AV and Meet Anti-Malware Compliance Requirements

by Carbon BlackNov 02, 2016

Now you can replace your ineffective AV solution and still meet PCI DSS anti-malware requirements with Cb Defense. Learn how.


SUBTOPICS:

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Cisco Umbrella

Avoid the aftermath with a before strategy. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.


Cyrus One

Headquarters: 1649 West Frankford Road Carrollton, Texas 75007

Enterprise Data Centers for the World's Largest Companies. CyrusOne offers a portfolio of more than 30 data centers across the U.S., Europe and Asia, comprising over 3 million square feet of total net rentable square footage (NRSF). Global firms seeking enterprise colocation solutions have consistently selected CyrusOne. Currently serving more than 900 customers worldwide, CyrusOne's strong growth over the past 15 years has made it the third-largest data center provider in the U.S. From the Fortune 20 to the Fortune 1000 and beyond, companies trust CyrusOne to provide scalable, reliable and secure data centers and connectivity solutions to meet their ever-changing needs. Join the more than 160 companies of the Fortune 1000 that take advantage of best-in-class data center solutions at CyrusOne."


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Digital Shadows

Digital Shadows provides cyber situational awareness to help organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. We are jointly headquartered in London and San Francisco. Digital Shadows helps large multi-national organizations in sectors including finance, retail, pharmaceuticals and oil and gas. Our flagship solution, Digital Shadows SearchLight,is a scalable and easy-to-use data analysis platform that provides a complete view of an organization's digital footprint and the profile of its attackers. SearchLight is complemented with support from our world-class intelligence operations team to ensure extensive coverage, tailored intelligence and frictionless deployment. Digital Shadows helps our customers see their organizations through an "attacker's eye view" and keep their assets and reputation intact.


Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.


Terbium Labs

Headquarters: Baltimore, Maryland

At Terbium Labs, we provide proactive solutions beginning with the assumption that your critical data is always at risk. That's why we focus on data intelligence, building systems to find your sensitive information wherever it may appear on the internet. We are an elite group of information security professionals with expertise in everything from cryptography to large-scale information systems. We protect organizations from relentless attempts to steal data for personal, monetary, or political gain. By offering continuous, proactive monitoring of critical data and rapid breach detection, we enable companies to better manage risk and keep high-value data safe.


Veriato

Veriato develops intelligent, powerful solutions that provide companies with visibility into, and understanding of, the human behaviors and activities occurring within their firewall, making them more secure and productive. We provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations.