TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






AlienVault Rides the Cloud to Unify Security Management

by AlienVaultMar 21, 2017

Security operations are in danger of being left behind, guarding on-premises networks while SMBs migrate their critical applications to the cloud. AlienVault's USM Anywhere offers centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures.


Ransomware Hostage Rescue Manual

by KnowBe4Mar 13, 2017

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.


CEO Fraud Prevention Manual

by KnowBe4Mar 13, 2017

CEO fraud is responsible for over $3 billion in losses. Don't be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.


How to Transform Employee Worst Practices Into IT Security Best Practices

by KnowBe4Mar 13, 2017

The bad guys are just one gullible user click away from staging an all-out invasion on your network. Get clear direction on how to go about improving your organization's security posture against social engineering attacks.


Report: Endpoint Protection Ransomware Effectiveness

by KnowBe4Mar 13, 2017

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined survey data of who is at risk, what the scope and cost of an attack is, how organizations are protecting themselves from ransomware, and the effectiveness of their endpoint protection. Find out what is really the best way to combat the threat of ransomware. The results might surprise you!


The Phishing Breakthrough Point

by KnowBe4Mar 13, 2017

Utilizing security awareness computer based training and simulated phishing security tests can be effective tools to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Find out more about the breakthrough point in an organization's phishing awareness level.


Preparing for Compliance with General Data Protection Regulation

by Skybox SecurityMar 06, 2017

A Technology Guide for Security Professionals

The General Data Protection Regulation (GDPR) is the latest amplification of the European Union's data security requirements that articulates measures to protect individuals and holds organizations accountable for data security.

When it goes into effect, GDPR can apply widely to various organizations, including many without a physical presence in the European Union. This SANS report explores this lengthy, complex regulation by focusing


Survey Findings from "The State of Mid-Market Cybersecurity"

by Arctic Wolf NetworksMar 03, 2017

Arctic Wolf Networks recently conducted a survey in partnership with Vanson Bourne that reveals major gaps between the perception and reality of cybersecurity challenges. The survey found that mid-market enterprises had very high confidence in their cybersecurity defenses, but in reality they struggled to defend against malicious activity that has become more sophisticated, more targeted and severe.

The data revealed a cybersecurity dissonance among mid-market enterprises, highlighting


Gartner Market Guide for Managed Detection and Response (MDR) Services

by Arctic Wolf NetworksMar 03, 2017

Managed detection and response (MDR) services is an emerging group of security monitoring providers with approaches that do not fit the traditional MSS model.

Key findings from the report:

• Organizations struggle to deploy, manage and use an effective combination of expertise and tools to detect threats, especially targeted advanced threats and insider threats.
• A growing number of providers are offering outcome-based services that differ from traditional


To SIEM or not to SIEM

by Arctic Wolf NetworksMar 03, 2017

Every organization — no matter the size — has data, network, IP, and other information to protect. When implemented well, SIEM (Security Information and Event Management) is a great tool that can protect your information and keep your business secure.

But there's a catch: managing a SIEM is akin to riding a bike uphill. When you stop pedaling the bike, you stop moving altogether. Constant attention is required to keep things moving. Managing a SIEM is a full-time job,


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


KnowBe4

KnowBe4, Inc. is the world's most popular integrated platform for Security Awareness Training and simulated phishing attacks. We help you manage the ongoing problem of social engineering.

KnowBe4 was founded on the principle that the human side of the cyber security industry is severely neglected. We have thousands of customers using our new-school security awareness training program to keep their networks safe.

We are in the business of training employees to make smarter security decisions.

Find out how affordable this is for your organization, you will be pleasantly surprised. Get a quote here: https://info.knowbe4.com/kmsat_get_a_quote_now


Skybox Security

Skybox Security's automated security risk and compliance management solutions help IT organizations pinpoint and prioritize security risks, compliance and availability exposures within minutes. These solutions automatically collect and analyze comprehensive data about network topology and systems, configuration settings, threats and vulnerabilities - anticipating the most urgent IT concerns before harm has been done.