UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Becoming a Proactive Bank

by AxwayAug 01, 2015

In today's highly competitive and overly regulated banking environment, the traditional "fix-on-failure" approach to business operations can no longer be tolerated. To transform their operations from manual and reactive to systematic and proactive, financial institutions need to gain operational intelligence by creating real-time situational awareness and predictive insight. This white paper explains the steps to become a proactive bank.

  • Axway
  • Business Intelligence
  • Regulations
  • Details

Operational Intelligence and Payments Monitoring

by AxwayAug 01, 2015

Today, payment processing happens within a worldwide economy that is sophisticated, unpredictable, and restless. Customers demand immediate response and a near perfect service that is fully delivered in real time. In a survey from independent newswire and information source for the financial technology community, Finextra and sponsored by Axway, 58% of respondents report having to make operational decisions without delay. This increases the risk of commitment breaches and reputational damage.

  • Axway
  • Payments
  • Business Intelligence
  • Details

Innovation and Immediate Payments: Cornerstones of Digitalization Strategy for Financial Services

by AxwayAug 01, 2015

For today's financial services providers, the ability to support seamless, immediate mobile payments (m-payments), electronic payments (e-payments) and virtual currencies is quickly becoming essential to remaining competitive and creating new revenue streams. But enabling immediate payments as a key foundation for organizational innovation and digitalization presents significant challenges.

In this white paper, you will learn: What does digitalization mean for existing IT systems?

  • Axway
  • Payments
  • Business Intelligence
  • Details

Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness

by DomainToolsAug 01, 2015

Read this white paper to learn what your SIEM isn't telling you, the importance of building a complete picture of the attack, and how to get better insight with better data.

  • DomainTools
  • Security
  • Cybersecurity
  • Details

Use Actionable Threat Intelligence To Protect Your Business

by SymantecJul 30, 2015

Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will undoubtedly receive five different responses. With every security vendor marketing and espousing the virtues of their approach to actionable intelligence, security and risk (S&R) leaders need a way to differentiate and dedicate their limited resources to the most beneficial intelligence sources.

In

  • Symantec
  • Cybersecurity
  • Security Monitoring
  • Risk Management/Security
  • Details

Dark Web Situational Awareness Report

by SurfWatch LabsJul 28, 2015

What does the Dark Web know about my company or my customers?

  • SurfWatch Labs
  • Security
  • Cybersecurity
  • Details

Advanced Analytics For Real-Time Incident Response

by RaytheonJul 27, 2015

In this e-book, Dr. Jones investigates three well-known breaches and takes us through the likely experiences of the security analysts at the time of each breach. He later shows us how these breaches could have been handled should the analysts have had the power of investigative analytics supporting their Incident Response objectives. Dr. Jones believes that effective cyber security is not about preventing all possible attacks, but rather, it's about mitigating damage when attacks do occur.

  • Raytheon
  • Cybersecurity
  • Security Management & Analytics
  • Details

Fighting the Insider Threat

by RaytheonJul 27, 2015

In this e-book, Dan Velez discusses, to effectively detect, respond and remediate the range of threatening user behaviors, contextual user behavior is necessary. That comes only from combining the best of network activity monitoring technologies with endpoint monitoring.

By applying the right remediation, implementing effective security policies, improving employee training, and targeting high-risk insiders, user activity monitoring can provide the visibility organizations need to

  • Raytheon
  • Network & Perimeter Security
  • Database Security
  • Details

Just Add Intelligence: Building Knowledge, Experience, and Expertise into Cybersecurity Incident Response

by NuixJul 21, 2015

The faster cybersecurity investigators can identify and contain data breaches, the less cost and damage their organization will suffer. Actionable intelligence allows investigators to spend less time searching and more on analysis and solving problems. But where does this intelligence come from?

An important aspect of intelligence for investigators is knowing where to look and which questions to ask, based on expertise and experience. However, there are only so many practitioners in

  • Nuix
  • Cybersecurity
  • Security platforms
  • Details

Protecting Critical-Value Data from the Inside: Designing and Implementing an Insider Threat Program

by NuixJul 21, 2015

More than one-third of all cybercrime incidents and security breaches are caused by insiders. These insiders have many motivations--financial, political, or even emotional--but the common factor is they all inappropriately access an organization's critical-value data.

While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to understand why some organizations have avoided the issue; the

  • Nuix
  • Cybersecurity
  • Network & Perimeter Security
  • Details