TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Empowering the Overwhelmed SOC

by NSS LabsFeb 26, 2017

While security teams continue to add their threat protection arsenal, they are struggling to keep up with the threats. Security information and event management (SIEM) products, threat analytics platforms, advanced endpoint protection (AEP) products, user entity behavior analytics (UEBA) tools, and incident response platforms all help increase visibility into threats, but significant gaps remain in how security analysts ingest and process data from these tools. Many of the challenges they face

  • NSS Labs
  • Security Management & Analytics
  • Endpoint Security
  • Details

SIEM: The New Force Multiplier

by NSS LabsFeb 26, 2017

To maximize the value of SIEM technology, we must first come to terms with the fact that it is not a magic wand that will make it all better. It is an enabling technology that grows more useful with actionable intelligence and prioritized threat insights.

  • NSS Labs
  • Security Monitoring
  • Endpoint Security
  • Details

Drowning in Data, Starving for Actionable Intelligence

by NSS LabsFeb 26, 2017

Organizations must not only choose intelligence sources that provide timely and relevant data, but they must also consider how they will integrate that data into their existing technologies and processes. Additionally, organizations must have practices in place to help them act on intelligence once it's available, or they're sure to suffer minimal returns.

  • NSS Labs
  • Database Security
  • Security Management & Analytics
  • Details

The Rebirth of Endpoint Protection

by NSS LabsFeb 26, 2017

Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Assessing new technologies is no small undertaking and analysts must often rely on comparing limited information from less-than-ideal conditions. What companies need are security efficacy comparison that represent real-world environments.

  • NSS Labs
  • Endpoint Security
  • Security Management & Analytics
  • Details

Stop Malware & Non-Malware Attacks with Streaming Prevention

by Carbon BlackFeb 23, 2017

Replace AV with streaming prevention uniquely built to stop both malware and non-malware attacks - Download the White Paper

  • Carbon Black
  • Endpoint Security
  • Cybersecurity
  • Details

Non-Malware Attacks and Ransomware Take Center Stage in 2016

by Carbon BlackFeb 23, 2017

Startling new trends show a rapid rise of non-malware attacks and success of ransomware - Download the Threat Report

  • Carbon Black
  • Cybersecurity
  • Endpoint Security
  • Details

Evernote Replaces Traditional AV with Cb Defense

by Carbon BlackFeb 23, 2017

Evernote Replaces Traditional AV with Cb Defense - Download the Success Story

  • Carbon Black
  • Security Monitoring
  • Endpoint Security
  • Cloud Security
  • Network & Perimeter Security
  • Details

Cb Defense Takes the Lead in Next-Generation Antivirus (NGAV)

by Carbon BlackFeb 23, 2017

Cb Defense Takes the Lead in Next-Generation Antivirus (NGAV) - Download the Gartner EPP Magic Quadrant

  • Carbon Black
  • Endpoint Security
  • Security platforms
  • Details

How To Avoid A Costly Bad Hire

by Murano SoftwareFeb 21, 2017

The cost of selecting the wrong person to hire can run into the hundreds of thousands of dollars. When you add to that the intangibles, like the potential negative impact to a company's morale and productivity, the cost of a bad hire goes up exponentially. According to a study by the Society for Human Resources Management, the cost of a bad hire can be as much as five times the person's annual salary. This paper explores how bad hiring choices happen and offers some practical advice on how to

  • Murano Software
  • Applications
  • Infrastructure
  • Details

Cybersecurity Needs Attention Infographic

by MalwarebytesFeb 21, 2017

IDG Connect surveyed over 200 organizations in the US to learn more about the cyber threats they face, how they manage them and where they think the most effective improvements to current cybersecurity systems can be made.

  • Malwarebytes
  • Cybersecurity
  • Security Monitoring
  • Security
  • Details