TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Definition of SOC-cess: SANS 2018 SOC Survey Results

by ExtraHopAug 17, 2018

This report collects and analyzes the results of the SANS 2018 SOC Survey. It provides a detailed look at how Security Operations Centers work today, their biggest dissatisfactions with security products, and areas of low hanging fruit for SecOps improvement, based on a survey of a large, global subset of SecOps professionals.

  • ExtraHop
  • Security Management & Analytics
  • Security Monitoring
  • Details

EMA Radar Summary for Network-Based Security Analytics Q3 2018

by ExtraHopAug 17, 2018

This report from seasoned EMA security analysts explores the emerging category of Network Traffic Analytics, including the market landscape and key capabilities needed by products entering this category as it gains momentum.

  • ExtraHop
  • Security Management & Analytics
  • Security Monitoring
  • Details

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by SplunkAug 16, 2018

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this Dark Reading webinar, a top expert will offer some useful definitions of terms, and will discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT security staff

  • Security Management & Analytics
  • Details

The Hacker-Powered Security Report 2018

by HackerOneAug 16, 2018

The 2018 Hacker-Powered Security Report Is The Most Comprehensive Report On Hacker-Powered Security.

  • HackerOne
  • Security
  • Security Monitoring
  • Details

What Generation is Your Cyber Security?

by Check Point Software Technologies Ltd.Aug 15, 2018

Learn about the evolution of threats from the 1st generation through generation 5 and discover what you must do to prevent today's mega cyber attacks from damaging your IT infrastructure and data.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details

2018 Security Report

by Check Point Software Technologies Ltd.Aug 15, 2018

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks. As the cyber landscape evolves, the World Economic Forum recently placed cyber attacks as one of the top three global risks for 2018.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Security Management & Analytics
  • Details

Cyber Attack Trends 2018 Mid-Year Report

by Check Point Software Technologies Ltd.Aug 15, 2018

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Cybersecurity
  • Details

The Forrester Wave™: Endpoint Security Suites, Q2 2018

by Check Point Software Technologies Ltd.Aug 15, 2018

This detailed technical report by acclaimed analyst firm Forrester compares the effectiveness of the top 15 endpoint security solutions. See how endpoint security products from leading vendors stack up under rigorous testing.

  • Check Point Software Technologies Ltd.
  • Endpoint Security
  • Security Management & Analytics
  • Details

What is the Main Obstacle to Security?

by Check Point Software Technologies Ltd.Aug 15, 2018

Could staffing be cyber security's weak spot? Could business objectives be the problem? Read this research report to learn why most organizations' security is 2 to 3 generations out of step with today's threats.

  • Check Point Software Technologies Ltd.
  • Endpoint Security
  • Security Management & Analytics
  • Details

3 Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuest LLCAug 14, 2018

Improve security and monitoring of AWS, Azure & Google Cloud.

  • ReliaQuest LLC
  • Risk Management/Security
  • Security Monitoring
  • Details