Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Endpoint Security Buyers Guide

by SophosOct 07, 2015

Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Deciphering the Code: A Simple Guide to Encryption

by SophosOct 07, 2015

With data breaches and accidental data loss hitting the headlines more than ever; the role of encryption in your security plan continues to grow in importance. This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution.

Best Security Research of Q3 2015 - Infographic

by RiskIQOct 05, 2015

Busy during Q3? Don't worry! Here's an infographic linking to the most interesting and important security research released over the last quarter.

DocuSign Uses RiskIQ's Digital Footprint Solution to Keep Customers Safe and Maintain Secure, Trusted Reputation

by RiskIQOct 05, 2015

Learn how fellow security pros are using RiskIQ to combat today's customer facing threats. DocuSign CISO, Vanessa Pequeros, discusses how RiskIQ enables her team to detect threats outside of the firewall.

Why You Need to Protect Your Customers' Online Experience in Real-Time

by RiskIQOct 05, 2015

A whopping 69% of consumers have left websites because of security concerns. In the age of the consumer, brands must remain focused to protect their users from cyber threats. Learn how you can make a difference.

Enable Your Security Team to Manage Assets Outside Your Firewall

by RiskIQOct 05, 2015

The number of websites, social assets, and mobile apps you must secure usually far exceed the inventory your company has on record. Learn how you can discover previously unaccounted for websites, social assets, and mobile apps using RiskIQ's Enterprise Digital Footprint solution.

Brand Security and the CISO: Safeguarding Your Company's Critical Digital Footprint

by RiskIQOct 05, 2015

Strengthen your expertise on cyber threats endangering your company's brand and customers by viewing this webinar featuring Forrester Analyst, Nick Hayes, and RiskIQ VP of Product Strategy, Arian Evans.

SANS Survey: Incident Response Capabilities Needed

by Bit9Oct 05, 2015

Today's cybercriminals have learned to be patient, harvest more data, and cause significant security and financial effects. Because of this, organizations must detect and respond to incidents as quickly, efficiently and accurately as possible.

Protecting IT: Triumfant vs. The Competition

by TriumfantOct 01, 2015

Gain access to this collection of competitive briefs where you will gain insights into technology and business practices related to cybersecurity and solutions for protecting your IT assets.

2015 Threat Brief

by WebrootOct 01, 2015

Are you prepared for the next wave of malware, viruses, and threats? With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other smaller breaches, the trend shows no signs of slowing down. Download your complimentary copy of the Webroot 2015 Threat Brief to learn more about the biggest cyber threats of the last year, the latest discoveries by our Threat Research team, and how you can protect your business against data loss and



Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations' endpoints and servers, making it easier to see--and immediately stop--those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what's happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable.


Headquarters: San Francisco, CA

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint. Using a global proxy network and virtual user technology, RiskIQ continuously discovers, inventories and monitors managed, unmanaged and rogue web and mobile assets. This "Enterprise Digital Footprint" is persistently scanned for anomalies, external threats, malvertisements and brand impersonation. Leading financial institutions, insurance providers and consumer as well as B2B brands use RiskIQ to protect themselves and their users from code level threats, malware and fraud.


More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile and network security backed by SophosLabs - a global network of threat intelligence centers. Sophos is headquartered in Boston, US and Oxford, UK. www.Sophos.com


Headquarters: Rockville, Maryland

Triumfant's advanced analytics and intelligent, precision-based technology enable us to detect, analyze and immediately resolve attacks that bypass traditional, signature-based defenses. Self-learning and continuously evolving, Triumfant's endpoint protection technologies pick up where others leave off-effectively closing the gaps left by firewall, antivirus, sandbox technologies and Intrusion Prevention Systems. Triumfant not only captures data and detects malicious activity in real time, but it also verifies, contains, investigates, remediates and prevents future attacks.