UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

An Inside View of a Zero-day Campaign

by MalwarebytesAug 31, 2015

Cybercriminals work tirelessly to find new vulnerabilities in popular software-sometimes more tirelessly than the actual software developer. This spells disaster for users of that software, as cybercriminals are able to secretly exploit the vulnerability in what's known as zero-day attacks. This white paper follows one real-life zero-day attack performed on an Adobe Flash Player vulnerability. It provides a detailed timeline of how the attack entered the network, what parts of the network it

  • Malwarebytes
  • Software
  • Enterprise
  • Details

17 Security Products Tested for Malware Removal and Repair

by MalwarebytesAug 31, 2015

Strong anti-malware is the backbone of your security strategy. No matter how good the rest of your network's security is, you will be compromised if you do not have good anti-malware in place. For that reason, making the right anti-malware choice is critical. This white paper can help you with that choice. It presents the results of a series of independent tests on seventeen different anti-malware products. Read it now for research-based guidance on how to choose the best anti-malware solution

  • Malwarebytes
  • Software
  • Information Management
  • Details

Anti-Exploit Tools: The Next Wave of Enterprise Security

by MalwarebytesAug 31, 2015

From malware to ransomware to state-sponsored hacks, today's threat landscape is more complex and dangerous than ever. No organization, no matter how prepared it may think itself, is immune. However, if you're smart about managing the compromises that do occur, you may be able to keep yourself safe. In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them. Read on to learn how to protect your enterprise from today's

  • Malwarebytes
  • Software
  • Enterprise
  • Details

The State of Cloud Connectivity

by Comcast BusinessAug 28, 2015

IT managers are rethinking their reliance on the public Internet and Multiprotocol Label Switching (MPLS), the traditional standard used in wide area network environments, according to new research from UBM Tech.

The survey, sponsored by Comcast Business, revealed that organizations are intent on meeting key business goals, such as boosting employee productivity and reducing expenses associated with communications and IT operations. Some have turned to hosted cloud services to

  • Comcast Business
  • Cloud Services
  • Software as a Service
  • Details

Application Security Webinar Series

by Rogue Wave SoftwareAug 27, 2015

In this three-part series you will hear from security experts as they address:

• How to ensure your code is bulletproof
• How to ensure your processes are secure
• Questions from your peers on how to best manage your application security.

  • Rogue Wave Software
  • Security Management & Analytics
  • Security
  • Security Monitoring
  • Details

The Adventures of Moving to the Cloud

by INetUAug 27, 2015

43% of organizations experience failed or stalled cloud/hosting implementations. Moving to the cloud may seem like a walk in the park, but the path may be more treacherous than it seems. This infographic will guide you through the jungle that is the cloud and you will discover the common pitfalls and challenges of moving to the cloud and the keys to being successful.

  • INetU
  • Cloud Services
  • Cloud
  • Details

A Checklist for Moving to the Cloud

by INetUAug 27, 2015

This checklist contains several areas to explore as you begin planning the move of your business operations to the cloud. The items and questions apply to most organizations regardless of what or how much you are moving. The checklist will help you identify your specific needs and help a potential cloud hosting provider identify the services and infrastructure to support your business.

  • INetU
  • Cloud Services
  • Cloud
  • Details

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security

by CloudPassageAug 25, 2015

The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.

  • CloudPassage
  • Cloud Services
  • Infrastructure as a Service
  • Details

Five Threat Intelligence Traps to Avoid

by SymantecAug 24, 2015

Recent high-profile data breaches impacting organizations in all industries including retailers, health care organizations and government agencies have shown just how challenging today's cyberthreat landscape has become. Fortunately, threat intelligence, the act of collecting and interpreting threat information from various data sources to identify adversaries and their tools, tactics, and procedures, is available to help enterprises stay ahead of emerging threats. Learn how to use threat and

  • Symantec
  • Risk Management/Security
  • Cybersecurity
  • Details

When to Partner with a Managed Security Services Provider

by Dell SecureWorksAug 24, 2015

The information technology landscape is ever changing, which makes securing and monitoring IT networks more challenging. Today's threat actors are more organized and extremely well-funded. They have the time and the resources to study their targets and plan their attacks. It's no longer a matter of "if" but "when" an attack will occur.

From a security perspective, most large and small organizations struggle to fully understand their cyber vulnerability footprint in relation to their

  • Dell SecureWorks
  • Security Monitoring
  • Network & Perimeter Security
  • Details