TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Guide To AV Replacement

by CrowdStrikeFeb 28, 2017

It's time to upgrade your organization's legacy Antivirus (AV). Here is what you need to know before replacing your AV solution.

The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you'll get expert advice that can help you choose a security solution that best fits your organization's

  • CrowdStrike
  • Security Management & Analytics
  • Cybersecurity
  • Details

The 3 Essential Elements of Next-generation Endpoint Protection

by CrowdStrikeFeb 28, 2017

As data breaches continue to beleaguer enterprises, most IT and cybersecurity practitioners recognize the need to reconsider their endpoint security strategies. The term 'next-generation endpoint protection' is increasingly proffered as the solution to this problem. But what exactly is it and why is it better than the current generation of endpoint solutions in use today? We developed this white paper to help you sift through the hype and draw your own conclusions about what a true

  • CrowdStrike
  • Endpoint Security
  • Security
  • Details

Empowering the Overwhelmed SOC

by NSS LabsFeb 26, 2017

While security teams continue to add their threat protection arsenal, they are struggling to keep up with the threats. Security information and event management (SIEM) products, threat analytics platforms, advanced endpoint protection (AEP) products, user entity behavior analytics (UEBA) tools, and incident response platforms all help increase visibility into threats, but significant gaps remain in how security analysts ingest and process data from these tools. Many of the challenges they face

  • NSS Labs
  • Security Management & Analytics
  • Endpoint Security
  • Details

SIEM: The New Force Multiplier

by NSS LabsFeb 26, 2017

To maximize the value of SIEM technology, we must first come to terms with the fact that it is not a magic wand that will make it all better. It is an enabling technology that grows more useful with actionable intelligence and prioritized threat insights.

  • NSS Labs
  • Security Monitoring
  • Endpoint Security
  • Details

Drowning in Data, Starving for Actionable Intelligence

by NSS LabsFeb 26, 2017

Organizations must not only choose intelligence sources that provide timely and relevant data, but they must also consider how they will integrate that data into their existing technologies and processes. Additionally, organizations must have practices in place to help them act on intelligence once it's available, or they're sure to suffer minimal returns.

  • NSS Labs
  • Database Security
  • Security Management & Analytics
  • Details

The Rebirth of Endpoint Protection

by NSS LabsFeb 26, 2017

Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Assessing new technologies is no small undertaking and analysts must often rely on comparing limited information from less-than-ideal conditions. What companies need are security efficacy comparison that represent real-world environments.

  • NSS Labs
  • Endpoint Security
  • Security Management & Analytics
  • Details

Stop Malware & Non-Malware Attacks with Streaming Prevention

by Carbon BlackFeb 23, 2017

Replace AV with streaming prevention uniquely built to stop both malware and non-malware attacks - Download the White Paper

  • Carbon Black
  • Endpoint Security
  • Cybersecurity
  • Details

Non-Malware Attacks and Ransomware Take Center Stage in 2016

by Carbon BlackFeb 23, 2017

Startling new trends show a rapid rise of non-malware attacks and success of ransomware - Download the Threat Report

  • Carbon Black
  • Cybersecurity
  • Endpoint Security
  • Details

Evernote Replaces Traditional AV with Cb Defense

by Carbon BlackFeb 23, 2017

Evernote Replaces Traditional AV with Cb Defense - Download the Success Story

  • Carbon Black
  • Security Monitoring
  • Endpoint Security
  • Cloud Security
  • Network & Perimeter Security
  • Details

Cb Defense Takes the Lead in Next-Generation Antivirus (NGAV)

by Carbon BlackFeb 23, 2017

Cb Defense Takes the Lead in Next-Generation Antivirus (NGAV) - Download the Gartner EPP Magic Quadrant

  • Carbon Black
  • Endpoint Security
  • Security platforms
  • Details