TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

A Security Officer Debate: Are Simulated Phishing Attacks an Effective Approach?

by Wombat Security TechnologiesAug 26, 2016

Read frontline observations of leading CSOs and security leaders from major vertical sectors on how they maximize the strengths and avoid the pitfalls of simulated phishing attacks.

  • Security Monitoring
  • Security platforms
  • Details

Global Manufacturing Company Reduces Malware Infections by 46

by Wombat Security TechnologiesAug 26, 2016

Learn how Wombat's Security Education Platform reduced malware infections by 46% and lowered remediation costs for a global manufacturing company.

  • Security Monitoring
  • Security platforms
  • Details

Security Education: Breaking Down the Obstacles

by Wombat Security TechnologiesAug 26, 2016

Discover the common obstacles IT managers and CSOs face when building a measurable security awareness plan, as well as a step-by-step plan for gaining approval of security programs within an organization.

  • Security Management & Analytics
  • Risk Management/Security
  • Details

Optiv's Six Forces of Security Strategy

by OptivAug 25, 2016

Through thousands of engagements with leading organizations, Optiv has identified six essential forces that come into play when building a secure environment. These forces, both internal and external, have significant impact on security strategy. Awareness and monitoring of these forces is essential to reducing risk, responding to change and anticipating threats. Optiv's Six Forces of Security Strategy can guide you as you consider the relative weighting of these forces and their influence on

  • Optiv
  • Strategic CIO
  • IT Strategy
  • Risk Management/Security
  • Details

S.O.S - Save Our SIEM

by OptivAug 25, 2016

SIEM is not dead. At times it may seem like it's on life support, as neglect and lack of resources lead many companies to abandon the in-house security operations center (SOC) and migrate to managed security service provider (MSSP) solutions. It is not uncommon to hear mounting frustration over security information and event management (SIEM) solutions that struggle to provide significant value. Typical short-term pains keep the focus on custom log sources, additional hardware to support an

  • Optiv
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Security Incident Management Solution Primer

by OptivAug 25, 2016

Today, the capability to respond effectively to cyber incidents is one of the most critical components of an enterprise security program. A growing rate of breach disclosures in the news serves as proof that for most organizations, breaches are inevitable. For organizations of all sizes to survive these public debacles, they must enhance incident response capabilities as part of a principal investment in their security incident management program. The alternative is to risk damage to brand

  • Optiv
  • Cybersecurity
  • Risk Management/Security
  • Details

Cyber Threat Intelligence

by OptivAug 25, 2016

Optiv research has identified a key challenge to the impact of cyber threat intelligence: the heavily diluted term "threat intelligence" attaches to a diverse array of products, services and capabilities and is not easily adopted across the various enterprise security use cases. Our experience shows that to solve this challenge, we must understand that intelligence is the connective tissue between knowing your enemy and a security strategy that enables decision advantage to significantly reduce

  • Optiv
  • Cybersecurity
  • Risk Management/Security
  • Details

Cloud Security Software-as-a-Service Solution Primer

by OptivAug 25, 2016

There is absolutely no doubt that enterprises are adopting cloud applications using the Software as a Service (SaaS) model. In fact, recent reports from two leading cloud access security broker (CASB) vendors, Netskope and Skyhigh Networks, both show an astounding average number of applications in use in the enterprise. According to the Netskope February 2016 Worldwide Cloud Report, the average enterprise now has about 917 total cloud applications in use. Skyhigh Networks reports an even higher

  • Optiv
  • Cloud Security
  • Software as a Service
  • Cloud Services
  • Security
  • Details

Wombat Security 2016 State of the Phish Report

by Wombat Security TechnologiesAug 25, 2016

The State of the Phish report details millions of simulated phishing attacks and includes an extensive survey of Info Sec professionals.

  • Cybersecurity
  • Risk Management/Security
  • Details

Understanding the Workspace ONE Secure App Token System

by VMwareAug 22, 2016

Do you want to provide your employees with seamless remote access to all of their business resources, while simultaneously giving IT a more efficient, simplified way of managing various devices and applications? Workspace ONE™'s system puts access back into the hands of the user, while maintaining security with policy-controlled options for managed and unmanaged devices. Find out how their one-touch mobile single sign-on (SSO) and Secure App Token Systems (SATS) works to provide

  • VMware
  • Mobile
  • Mobile Application Management
  • Details