UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Cyberthreat Defense Report

by Blue CoatAug 03, 2015

This report published by information security researcher, CyberEdge Group, provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.

  • Security
  • Disaster Recovery
  • Blue Coat
  • Security Monitoring
  • Details

Gartner: Five Styles of Advance Threat Defense

by Blue CoatAug 03, 2015

There's a new wave of innovation in security technology, according to Gartner. Find out how to evaluate and choose among the new options for protecting your enterprise against today's advanced threats.

  • Blue Coat
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Cybersecurity Dossier - a post malware age reality

by Bay DynamicsAug 03, 2015

Cyber attackers are not just sharing and leveraging successful data breach methods, but also exfiltrated data feeds. The result - a Cybersecurity Dossier that includes user credentials, exploitable high value systems and applications, vendor credentials and exploitable vendor assets. This infographic outlines how the dossier and the voluminous data it contains is being used drive major cyberattacks and the new realities of the post malware age.

  • Bay Dynamics
  • Cybersecurity
  • Security
  • Details

The Data Loss Prevention Market by the Numbers

by Digital GuardianAug 03, 2015

451 Research has just released their in depth analysis of the Data Loss Prevention (DLP) market. In light of recent high profile data breaches, protection of sensitive financial data and valuable intellectual property requires a more comprehensive data security strategy. As a result, DLP is back in vogue.

There is a market resurgence in DLP that is expected to continue to grow each year. Rather than viewing DLP as a standalone product, this report's studies show that DLP is quickly

  • Digital Guardian
  • Database Security
  • Cybersecurity
  • Details

Advanced Threat Defense e-guide

by Blue CoatAug 03, 2015

Every successful security attack causes lasting damage to your network and enterprise. New research shows a breach takes 31 days to clean up and costs on average $3.5 million.

Take a look at the graphical, fact-filled e-Guide from Blue Coat. You'll discover:
• Why enterprises are losing the battle against advanced threats and targeted malware
• How a comprehensive advanced threat defense solution can reduce risk

  • Blue Coat
  • Security Management & Analytics
  • Security Monitoring
  • Details

Big Data Security for Dummies

by Blue CoatAug 03, 2015

The sheer number of advanced security threats is growing every day. So is the sophistication of cyberattacks. Custom malware. Drive-by downloads. Watering-hole attacks. The list goes on and on. Read Big Data Security for Dummies, and learn how to harness the power of Big Data to detect, analyze, and respond to today's sophisticated attacks.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

3 Ways Putting APIs First Can Drive Business and IT Transformation

by AxwayAug 01, 2015

The future of business is digital—by 2020, 25 billion connected things will be in use. Does your company have an API first strategy to tackle the challenges of the digital economy? This eBook provides a structured approach to developing your API strategy around: Accelerated application delivery Driving success with partners Improving the customer experience Included is a practical toolkit to help CIOs and technologists frame their strategy and ensure best practices are applied around

  • Axway
  • Enterprise
  • Software
  • Details

There's a Revolution Happening in B2B Integration

by AxwayAug 01, 2015

Enterprises who have embraced and benefited from the use of EDI and API exchange channels as distinct silos are now coming together into a single open space, and demanding a single B2B solution that will span the full 360° of this new and expanding landscape. Download the white paper to learn more.

  • Axway
  • Software
  • Productivity
  • Details

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance

by AxwayAug 01, 2015

Sure, end users love the ease of today's cloud-based file transfer solutions. But for IT, ad hoc file transfers lack security, governance and reporting capabilities, and likely don't meet most SLAs or regulatory compliance mandates.

Get the Ovum brief and discover: How to gain end-to-end visibility into where data transfers begin and end, and who has access How to protect data from unauthorized users no matter how it is transferred--from within or outside the enterprise How to

  • Axway
  • Software
  • Information Management
  • Details

Info-Tech Report: Select and Implement a Managed File Transfer Solution

by AxwayAug 01, 2015

MFT emerged from limitations with traditional file transfer techniques, such as basic FTP servers. FTP servers lacked the ability to handle growing data volume requirements and provide enough visibility into file transfer activity, and organizations looked to MFT to fill that need.

The Info-Tech Research Group Vendor Landscape report evaluates the features and performance of managed file transfer products according to 4 use-case scenarios and ranks providers by their ability to

  • Axway
  • Software
  • Information Management
  • Details