Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Endpoint eBook

by WebrootOct 01, 2015

Webroot SecureAnywhere Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook. With SecureAnywhere solutions, you get: - Advanced Offline Protection Against Zero-Day & Highly Adaptive Threats - Zero Conflicts with Existing Security Software - Complete User Agent Policy

Passmark Report

by WebrootOct 01, 2015

PassMark Software conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents the results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroots SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using

2015 Threat Brief

by WebrootOct 01, 2015

Are you prepared for the next wave of malware, viruses, and threats? With more breaches at major retailers, financial institutions and technology companies in the headlines and scores of other smaller breaches, the trend shows no signs of slowing down. Download your complimentary copy of the Webroot 2015 Threat Brief to learn more about the biggest cyber threats of the last year, the latest discoveries by our Threat Research team, and how you can protect your business against data loss and

Protecting IT: Triumfant vs. The Competition

by TriumfantOct 01, 2015

Gain access to this collection of competitive briefs where you will gain insights into technology and business practices related to cybersecurity and solutions for protecting your IT assets.

Anticipating Cyber Vulnerability Exploits Using Machine Learning

by Recorded FutureSep 30, 2015

Do you want to anticipate cyber exploits? With so many threats and exploits in the wild, its difficult to know which vulnerabilities will result in an actual exploit and cause harm. Making early assessments can help security managers discover possible threats in advance and prioritize vulnerability management. In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data. The report is now available to the

Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

by Bit9Sep 28, 2015

Use threat intelligence to beat advanced threats. Learn how incident responders can utilize automation and a recorded history to improve response processes and procedures over time.

Up and to the Right: ICS/SCADA Vulnerabilities by the Numbers

by Recorded FutureSep 24, 2015

ICS attacks are growing ... fast. Industrial control systems (ICS) and SCADA systems are subject to cyber attack, just like any digitally connected system. Because the potential devastation is so high, Recorded Future conducted a study to learn more about the risks. Our aim in this study was to understand the available and known capabilities for attacks on ICS systems. What we found was a worrying trend of ICS exploits available and ready to be exploited.

Patch Tuesday

by MalwarebytesSep 24, 2015

Each month, IT managers look forward to Patch Tuesday with a mixture of suspense and fear. What patches will be available? How will it impact their systems? As new malware threats become more advanced-from zero-day exploits to reverse-engineered patches-Patch Tuesday is proving to be an ineffective security solution on its own.

50 Shades of Dark

by Recorded FutureJun 01, 2015

There is a lot of talk about the Dark Web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

Using open source intelligence (OSINT), our team explored the Surface, Deep, and Dark parts of the Web and investigated the links between them.

Download this white paper to learn: What the Dark, Deep, and Surface Web really are and why your information security team should care. How stolen

Anticipating Cyber Attacks

by Recorded FutureJun 01, 2015

Advanced cyber attackers are winning the race against defenders. To regain the lead, organizations must forecast attacks before they are impacted.

Anticipating cyber attacks allows you to proactively defend your organization rather than perform expensive and reactive incident response, which can include everything from deep forensics to throwing out millions of dollars worth of security infrastructure. And not to mention massive reputation repair campaigns.

This white



Bit9 + Carbon Black provides the most complete solution against advanced threats that target organizations' endpoints and servers, making it easier to see--and immediately stop--those threats. The company enables organizations to arm their endpoints by combining continuous, real-time visibility into what's happening on every computer; real-time signature-less threat detection; incident response that combines a recorded history with live remediation; and prevention that is proactive and customizable.


Headquarters: San Jose CA 95113

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why more than 50,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts

Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.


Headquarters: Rockville, Maryland

Triumfant's advanced analytics and intelligent, precision-based technology enable us to detect, analyze and immediately resolve attacks that bypass traditional, signature-based defenses. Self-learning and continuously evolving, Triumfant's endpoint protection technologies pick up where others leave off-effectively closing the gaps left by firewall, antivirus, sandbox technologies and Intrusion Prevention Systems. Triumfant not only captures data and detects malicious activity in real time, but it also verifies, contains, investigates, remediates and prevents future attacks.