UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Top Five Things You Need to Know Before Building or Upgrading Your Cloud Infrastructure

by InfineraJul 28, 2016

As application bandwidth grows and enterprises move to build hybrid clouds, they need scalable, easy to use, power-efficient data center interconnect (DCI) solutions. CIOs and IT managers around the world continue to look for more efficient ways to scale bandwidth to support optimal application performance, while controlling cost. Read more about the most critical DCI decision criteria and Infinera's DCI solutions.

  • Infinera
  • Data centers
  • Networking
  • Details

Building Distributed Internet Exchanges With Cloud Xpress

by InfineraJul 28, 2016

The demand for Internet Exchange (IX) services drives continued, rapid expansion of IX facilities. Leading IX providers often operate multiple facilities within a single metro area and interconnect them to operate as a single, large scale, Distributed Internet Exchange. Learn how Infinera's Cloud Xpress is helping Internet Exchange providers: - Dramatically increase capacity between facilities -Deploy in minutes without optical expertise -Provide simple connections, as easy as a cross-connect

  • Infinera
  • Data centers
  • Networking
  • Details

Low Latency Data Center Interconnect Using Infinera Cloud Xpress Optical Transport and Arista Data Center Switches

by InfineraJul 28, 2016

Infinera and Arista Networks collaborated with The Lippis Report to test an end-to-end datacenter interconnect (DCI) solution using Infinera's Cloud Xpress optical transport platform with Arista 100 Gb/s data center switches. The test results validated line-rate 100 gigabit Ethernet (GbE) throughput and ultra-low latency, with extended reach and ease of use. Find out why The Lippis Report said Cloud Xpress "will find a welcome reception in large enterprises who need to interconnect datacenters

  • Infinera
  • Cloud Services
  • Cloud
  • Details

The Incident Response Success Checklist: Nine Critical Steps Your Current Plan Lacks

by cybereasonJul 26, 2016

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical steps, impeding how quickly normal business operations are restored. Read our brief guide to: 1. Learn the nine important steps you should incorporate into your IR plan. 2. Discover how to incorporate these steps into your organizations' routine. 3. Measure your improvement

  • cybereason
  • Security
  • Cybersecurity
  • Details

Five Emerging Threats Enterprise Security Must Not Ignore

by cybereasonJul 26, 2016

Cybereason's researchers have reviewed data from 1 million customer endpoints, including computers and servers in some of the world's best known and frequently targeted companies, to gather insight on the latest techniques, tactics and procedures used by adversaries. Read about the five emerging threats our research team has determined enterprise security cannot ignore.

  • cybereason
  • Cybersecurity
  • Security
  • Details

OSX.Pirrit: The Minds Behind the Malicious Mac Adware

by cybereasonJul 26, 2016

In his latest research report, Cybereason senior security researcher Amit Serper reveals what company is behind OSX.Pirrit. This particularly nasty piece of adware, which targets Mac OS X, has traits typically seen in malware, like persistence and the ability to gain root access.

  • cybereason
  • Security
  • Cybersecurity
  • Details

Returning Power to the Defenders: The Four Secrets of Combating APTs

by cybereasonJul 26, 2016

Nation-states are not the only ones using advanced persistent threats to carry out attacks. APT techniques are now employed by various adversaries to target companies and steal their most coveted assets. Fortunately, there are ways for defenders to regain power. This white paper discusses the four highly effective and often overlooked ways to fight APTs, including: >Visibility helps security teams know their enemy >Use analytics to develop threat intelligence >Use threat intelligence to

  • cybereason
  • Security
  • Cybersecurity
  • Details

You Will Be Breached

by cybereasonJul 26, 2016

Attackers have a 100% success rate when penetrating networks. Accepting that a network breach is inevitable requires security teams to adopt a new post-breach mentality. This quick read discusses this mindset shift and offers important actions you can take now.

  • cybereason
  • Security
  • Cybersecurity
  • Details

Magic Quadrant for Enterprise File Synchronization and Sharing

by BoxJul 26, 2016

Enterprise file synchronization and sharing (EFFS) destination vendors increasingly address digital workplace enablement. IT leaders can consider this market and choose among a range of maturing cloud-based content collaboration and data infrastructure modernization.

  • Box
  • Box.net
  • Platform as a Service
  • Cloud Services
  • Details

Security Tools: An Attacker's Dream Come True

by enSiloJul 25, 2016

Security tools are intrusive by nature. They are privy to our user behavior and machine internals; they run as highly privileged processes; they inspect the user, machine and network activity; they "decide" for us what is "good" or "bad." Gaining control over a security tool is an attacker's dream come true.

This report reviews the vulnerabilities of security tools and their risks, as well as practical steps chief information security officers (CISOs) and their teams can take to

  • enSilo
  • Network & Perimeter Security
  • Security Monitoring
  • Details