UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

UND Eliminates Data Overload with iDashboards

by iDashboardsJul 01, 2015

Struggling with data overload from fact books and static reporting, the University of North Dakota sought a solution that would be used internally and externally, pulling data from their different systems, databases and spreadsheets. Read more to find out why staff at UND are now more enthusiastic about looking at the data.

  • iDashboards
  • Big Data Analytics
  • Software Platforms
  • Details

Flip the Odds: Using Active Breach Detection Against Advanced Attackers

by LightCyberJul 01, 2015

Advanced attacks like breaches against Target, Home Depot, and Sony have proven today's attackers have the odds stacked in their favor. Attackers can launch unlimited intrusion attempts, consequence-free, until they find a successful technique to circumvent a target company's prevention systems. This paper shows by using a new class of tools called Active Breach Detection, which automatically profiling typical user and device behavior, you can detect anomalous attack behavior that deviates from

  • LightCyber
  • Security
  • Security platforms
  • Details

LightCyber Magna Financial Benefits: Comparison vs. Legacy SIEM and Analytics Platforms

by LightCyberJul 01, 2015

Are relevant and critical alerts getting buried under hundreds of false alerts? In the highly publicized Target example, two relevant alerts were fired but missed among the hundreds of other alerts received that same day. This new white paper shows how Active Breach Detection solutions like LightCyber Magna produce alerts only upon confirmed attack behavior, not low accuracy "indicators of compromise" or "technical artifacts". It demonstrates how LightCyber provides highly cost-effective and

  • LightCyber
  • Security platforms
  • Security Monitoring
  • Details

Socializing Dashboards: How to go Beyond Clicks & Analytics

by iDashboardsJul 01, 2015

Analyzing data is no longer the only use for a dashboard. From motivation to accountability to LCDs in the lobby, this white paper discusses the different ways organizations can utilize dashboards, allowing them to communicate and engage a wider audience.

  • iDashboards
  • Big Data Analytics
  • Software Platforms
  • Details

BI vs. VI: Improving Performance with Visual Intelligence

by iDashboardsJul 01, 2015

Explore your business intelligence resources and learn how to turn your business intelligence (BI) data into visual intelligence (VI). By taking information out of rows and columns and displaying it in a visual dashboard, you will be able to easily spot trends and make analyses in real-time.

  • iDashboards
  • Big Data Analytics
  • Software Platforms
  • Details

The Quick Guide to Managed Security Services for Midsize Businesses

by Digital GuardianJul 01, 2015

According to PwC's Global State of Information Security Survey 2015, midsize business are now a primary target for cybercriminals. Read this e-book to learn why it matters for your company.

What's Inside Three reasons why midsize businesses should care about data protection What should a midsize company with stretched it do? Five things to look for in a data protection managed security program

  • Digital Guardian
  • Cybersecurity
  • Security Monitoring
  • Details

How to be Ready for a Client Data Security Audit

by Digital GuardianJul 01, 2015

Learn how a Managed Security Program can help you quickly and cost efficiently demonstrate to your corporate clients that you can secure their sensitive data--without requiring additional IT resources.

What's Inside What is a Managed Security Program? How Digital Guardian can help you meet the 12 common questions in a client data security audit The 5 ways our Managed Security Program is different

  • Digital Guardian
  • Security Management & Analytics
  • Security platforms
  • Details

Data Protection Security Audit Checklist

by Digital GuardianJul 01, 2015

This checklist is based on Digital Guardian's experience with a range of customers who've been required to meet stringent client data protection security audits.

What's Inside The 12 most common questions in a client data protection audit What the client is really looking for with each question Guidance on your "audit readiness"

  • Digital Guardian
  • Security Monitoring
  • Network & Perimeter Security
  • Details

5 Myths Holding Your Security Program Back

by Digital GuardianJul 01, 2015

Security industry legend Dan Geer argues there are five misconceptions common to many data protection programs that are hurting your overall program's effectiveness.

What's Inside Dan Geer debunks five common myths preventing effective data security. Tips on how security teams can redirect their resources to focus on proactive data protection. How to simplify your security strategy by focusing on keeping sensitive data safe.

  • Digital Guardian
  • Security Monitoring
  • Security Management & Analytics
  • Details

Ease of Use, Dynamic Features Impact Operations at BHC

by iDashboardsJul 01, 2015

Boone Hospital needed a solution that would give them the ability to centralize all of their critical data into one location and drilldown into key metrics. With iDashboards, they are now able to identify patterns or trends impacting operations, allowing them to make better business decisions.

  • iDashboards
  • Big Data Analytics
  • Software Platforms
  • Details