UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The State of Social Media Infrastructure Part III

by ProofpointJul 07, 2015

This industry-first research looks at how well early corporate social media compliance programs are functioning in a difficult environment by analyzing the content posted to over 32,000 Fortune 100 social accounts. It provides a taxonomy of the most common incidents, real-world examples, key operational challenges, and steps that any organization can take to better manage social media compliance risk.

  • Proofpoint
  • Security Monitoring
  • Risk Management/Security
  • Details

DaaS Infographic

by NaviSiteJul 01, 2015

NaviSite's NaviCloud DaaS uses the cloud to deliver information and applications to ANYONE, ANY TIME, ANYWHERE on ANY DEVICE.

  • NaviSite
  • Information Management
  • Enterprise
  • Details

The New Defense Against Targeted Attacks: Introducing Active Breach Detection

by LightCyberJul 01, 2015

Organizations are spending millions on securing their network with a multitude of security solutions such as firewalls, anti-viruses and intrusion detection systems to name just a few. This paper explains why traditional solutions are still failing at detecting all attacks and breaches and what can be done to close this detection gap. It reviews the attack phases, and posits that the majority of security investments are devoted at prevention, which can't be 100% effective. Beating the hacker

  • LightCyber
  • Cybersecurity
  • Security platforms
  • Details

Flip the Odds: Using Active Breach Detection Against Advanced Attackers

by LightCyberJul 01, 2015

Advanced attacks like breaches against Target, Home Depot, and Sony have proven today's attackers have the odds stacked in their favor. Attackers can launch unlimited intrusion attempts, consequence-free, until they find a successful technique to circumvent a target company's prevention systems. This paper shows by using a new class of tools called Active Breach Detection, which automatically profiling typical user and device behavior, you can detect anomalous attack behavior that deviates from

  • LightCyber
  • Security
  • Security platforms
  • Details

LightCyber Magna Financial Benefits: Comparison vs. Legacy SIEM and Analytics Platforms

by LightCyberJul 01, 2015

Are relevant and critical alerts getting buried under hundreds of false alerts? In the highly publicized Target example, two relevant alerts were fired but missed among the hundreds of other alerts received that same day. This new white paper shows how Active Breach Detection solutions like LightCyber Magna produce alerts only upon confirmed attack behavior, not low accuracy "indicators of compromise" or "technical artifacts". It demonstrates how LightCyber provides highly cost-effective and

  • LightCyber
  • Security platforms
  • Security Monitoring
  • Details

BI vs. VI: Improving Performance with Visual Intelligence

by iDashboardsJul 01, 2015

Explore your business intelligence resources and learn how to turn your business intelligence (BI) data into visual intelligence (VI). By taking information out of rows and columns and displaying it in a visual dashboard, you will be able to easily spot trends and make analyses in real-time.

  • iDashboards
  • Big Data Analytics
  • Software Platforms
  • Details

Multivariate Attack Detection: Core Engine for the Detection of Advanced Attackers

by LightCyberJul 01, 2015

The detection of advanced attackers within live production networks poses a significant challenge. Many legacy security vendors are attempting to shift their focus to this broadly-recognized problem, but most are ill-suited to the task. This white paper shows how Multivariate Attack Detection utilizes the broadest set of inputs across network and endpoint, builds profiles of users and devices, and then detects active attackers based on the anomalies their activity by-necessity introduces (not

  • LightCyber
  • Cybersecurity
  • Security platforms
  • Details

The Quick Guide to Managed Security Services for Midsize Businesses

by Digital GuardianJul 01, 2015

According to PwC's Global State of Information Security Survey 2015, midsize business are now a primary target for cybercriminals. Read this e-book to learn why it matters for your company.

What's Inside Three reasons why midsize businesses should care about data protection What should a midsize company with stretched it do? Five things to look for in a data protection managed security program

  • Digital Guardian
  • Cybersecurity
  • Security Monitoring
  • Details

How to be Ready for a Client Data Security Audit

by Digital GuardianJul 01, 2015

Learn how a Managed Security Program can help you quickly and cost efficiently demonstrate to your corporate clients that you can secure their sensitive data--without requiring additional IT resources.

What's Inside What is a Managed Security Program? How Digital Guardian can help you meet the 12 common questions in a client data security audit The 5 ways our Managed Security Program is different

  • Digital Guardian
  • Security Management & Analytics
  • Security platforms
  • Details

Data Protection Security Audit Checklist

by Digital GuardianJul 01, 2015

This checklist is based on Digital Guardian's experience with a range of customers who've been required to meet stringent client data protection security audits.

What's Inside The 12 most common questions in a client data protection audit What the client is really looking for with each question Guidance on your "audit readiness"

  • Digital Guardian
  • Security Monitoring
  • Network & Perimeter Security
  • Details