Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Security Incident Management Solution Primer

by OptivAug 25, 2016

Today, the capability to respond effectively to cyber incidents is one of the most critical components of an enterprise security program. A growing rate of breach disclosures in the news serves as proof that for most organizations, breaches are inevitable. For organizations of all sizes to survive these public debacles, they must enhance incident response capabilities as part of a principal investment in their security incident management program. The alternative is to risk damage to brand

Cyber Threat Intelligence

by OptivAug 25, 2016

Optiv research has identified a key challenge to the impact of cyber threat intelligence: the heavily diluted term "threat intelligence" attaches to a diverse array of products, services and capabilities and is not easily adopted across the various enterprise security use cases. Our experience shows that to solve this challenge, we must understand that intelligence is the connective tissue between knowing your enemy and a security strategy that enables decision advantage to significantly reduce

Cloud Security Software-as-a-Service Solution Primer

by OptivAug 25, 2016

There is absolutely no doubt that enterprises are adopting cloud applications using the Software as a Service (SaaS) model. In fact, recent reports from two leading cloud access security broker (CASB) vendors, Netskope and Skyhigh Networks, both show an astounding average number of applications in use in the enterprise. According to the Netskope February 2016 Worldwide Cloud Report, the average enterprise now has about 917 total cloud applications in use. Skyhigh Networks reports an even higher

Office 365 - Approaches for Optimizing Security

by VMwareAug 22, 2016

Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and collaboration apps and email on user's devices.

The 5 Characteristics of an Intelligence-Driven SOC

by ThreatConnectAug 17, 2016

Security operations centers (SOCs) must be architected for intelligence, embracing an adaptive security architecture to become context-aware and intelligence-driven. Security leaders should understand how intelligence-driven SOCs use tools, processes and strategies to protect against modern threats. Learn about how you can set up, manage and mature the SOC team in your organization.

6 Easy Ways to Advance Your Cybersecurity Team

by ThreatConnectAug 17, 2016

In this paper, you will learn six easy steps you can take to enhance your ability to ingest, store, and prioritize threat data, develop intelligence-driven processes to automate manual tasks, and streamline your work flow. The right platform (and processes you drive with it) can be a force-multiplier for your small team.

Gartner Report: The Five Models of Security Operation Centers

by Arctic WolfAug 16, 2016

Gartner outlines the five models of Security Operation Centers and provides practical guidance to CISOs planning to build a SOC capability.

Managed Detection and Response Stops Ransomware

by Arctic WolfAug 16, 2016

Why Managed Detection and Response (MDR) is key to stopping the ransomware epidemic.

FAQ: Managed Detection and Response

by Arctic WolfAug 16, 2016

Frequently asked questions about MDR and how it is different from MSSP.

Gaining a security operations center for less than the cost of a full-time security engineer

by Arctic WolfAug 16, 2016

How Threshold implemented a state-of-the-art security operations center for less than the cost of one full-time employee.


Arctic Wolf

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as-a-service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


Headquarters: Denver, CO

Optiv's vision is to become the most advanced, most comprehensive and most trusted partner for cyber security solutions. We provide a full suite of information security services and solutions that help define cyber security strategy, identify and remediate threats and risks, select and deploy the right technology, and achieve operational readiness to protect from malicious attack.

We serve as a client advocate, holistically addressing information security needs ranging from the program level all the way down to the project level. We help businesses, governments and educational institutions plan, build and run successful information security programs, solve focused security problems, and execute specific IT security projects.


ThreatConnect unites cybersecurity people, processes and technologies behind a cohesive intelligence-driven defense. Built for security teams at all maturity levels, the ThreatConnect platform enables organizations to benefit from their collective knowledge and talents; develop security processes; and leverage their existing technologies to identify, protect and respond to threats in a measurable way. More than 1,200 companies and agencies worldwide use ThreatConnect to maximize the value of their security technology investments, combat the fragmentation of their security organizations, and enhance their infrastructure with relevant threat intelligence. To register for a free ThreatConnect account, or to learn more about our products and services, visit:


VMware (NYSE: VMW) is the global leader in virtualization solutions from the desktop to the data center. Customers of all sizes rely on VMware to reduce capital and operating expenses, ensure business continuity, strengthen security and go green. With 2007 revenues of $1.33 billion, more than 120,000 customers and nearly 18,000 partners, VMware is one of the fastest-growing public software companies. VMware is headquartered in Palo Alto, California, and on the Web at