Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Establishing Trust in User Identities

by HID GlobalNov 30, 2015

Strong authentication goes beyond a single password.

As Enterprise Mobility Usage Escalates, So Does Security Risk

by HID GlobalNov 30, 2015

BYOD is no longer an industry trend; it's a fact of life for enterprise-wide operations and the IT organizations that must support them.

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication

by HID GlobalNov 30, 2015

Strong Authentication is the Foundation for Securing Mobile Access.

Multi-Layered Defense for an Evolving Threat Landscape

by Check Point Software Technologies, Ltd.Nov 23, 2015

ESG Analyst Jon Oltsik discusses the key elements of a defense-in-depth strategy to protect organizations from today's sophisticated malware.

What to Look for When Choosing a Sandboxing Solution

by Check Point Software Technologies, Ltd.Nov 23, 2015

Featuring Insights from "Gartner's Market Guide for Network Sandboxing" to help you select your next sandbox.

NSS Breach Detection Systems Test Report

by Check Point Software Technologies, Ltd.Nov 23, 2015

Real-world results from independent testing group NSS Labs evaluates today's leading sandboxing solutions based on catch rate and price.

Zero-Day Protection Redefined with SandBlast

by Check Point Software Technologies, Ltd.Nov 23, 2015

Today's modern malware often utilizes sophisticated evasion techniques to avoid detection... can you defeat them?

Boston Properties - A Study in Defeating Unknown Malware

by Check Point Software Technologies, Ltd.Nov 23, 2015

Discover how one of the largest developers and managers of office space protects their systems from advanced threats.

SANS A Proactive Response to Incident Response

by Blue CoatNov 23, 2015

Incident response (IR) costs skyrocket every year as the number of breaches increases. Worse, most industry professionals agree that it's not a matter of if but when a compromise will occur for any organization of suitable size or value, which means IR costs will only continue to rise. Whether it's paying for credit monitoring or to reissue affected credit cards, follow-up activities are expensive. They are also brand damaging. Nobody wants to be remembered as the next "largest breach to date."

Cyber Intrusion Services Report

by CrowdStrikeNov 19, 2015

This groundbreaking report from CrowdStrike's highly respected in-house Incident Response services team discloses hard-hitting new facts and insights into recent global attacks targeting large organizations. Based on decades of experience in the field, and focusing on actual intrusion cases the team has remediated during the past three years, the report reveals information that will change the way executives and security professionals view such attacks in the future. It also provides proactive


Blue Coat

Blue Coat Systems is the technology leader in application delivery networking. Distributed enterprises view the network and business-enabling applications as critical to their success. Unfortunately, they are struggling to keep pace in a rapidly changing business environment which can compromise their competitiveness. Blue Coat offers an Application Delivery Network Infrastructure that provides the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Unlike competitive offerings, Blue Coat offers unmatched visibility into the performance and security of business applications and web traffic running across the networks of the distributed enterprise, which provides the comprehensive application and user control required to contain costs, enhance business productivity and respond quickly to changing business requirements. Blue Coat has an aggressive strategy and solution roadmap to advance the integration of visibility, acceleration and security technologies at the heart of the Application Delivery Network.

Check Point Software Technologies, Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions. Falcon's patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time.

CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team's effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response.

HID Global

HID Global is the trusted leader in products, services and solutions related to the creation, management, and use of secure identities for millions of customers worldwide. Recognized for robust quality, innovative designs and industry leadership, HID Global is focused on creating customer value and is the supplier of choice for OEMs, integrators, and developers serving a variety of markets that include physical access control; IT security, including strong authentication/credential management; card personalization; visitor management; government ID; and identification technologies for technologies for a range of applications. HID Global is an ASSA ABLOY Group brand.