UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Selecting the Right Database Technology for Business Analytics

by SisenseSep 02, 2015

Choosing the most suitable database technology can make or break your business analytics deployment, especially when dealing with big data. Download this free guide to learn about the differences between various technology stacks - including distributed data warehouses, OLAP, and in-memory processing - and to find out which you technology is best suited for different business scenarios.

  • Sisense
  • Software
  • Enterprise
  • Details

The Cybercrime Economics of Malicious Macros

by ProofpointSep 01, 2015

Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats — and sometimes take their eye off old ones — and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case and technical analysis.

Our new report, "The Cybercrime Economics of Malicious Macros," examines the technical and business characteristics of malicious macros to

  • Proofpoint
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Gartner Magic Quadrant for Secure Email Gateways, 2015

by ProofpointSep 01, 2015

As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways, Proofpoint uniquely combines a world class email gateway solution with the industry's leading Targeted Attack Protection technology, catching and stopping cyberthreats from malicious links and attachments hours or even days before traditional defenses.

  • Proofpoint
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

Protecting Your Organization from Insider Threats

by Lockheed MartinSep 01, 2015

When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands - whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and enforcing some proactive measures can dramatically reduce the threat of sensitive data walking out the door.

This white paper discusses: Current risk factors - How sensitive data can fall into the wrong hands What you stand to lose from insider

  • Lockheed Martin
  • Risk Management/Security
  • Security Monitoring
  • Details

The Human Factor 2015

by ProofpointSep 01, 2015

Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.

This paper uses original field research to provide insight on who is clicking, and what they are clicking

  • Security
  • Storage
  • Vulnerabilities
  • Threats
  • Proofpoint
  • Details

An Inside View of a Zero-day Campaign

by MalwarebytesAug 31, 2015

Cybercriminals work tirelessly to find new vulnerabilities in popular software-sometimes more tirelessly than the actual software developer. This spells disaster for users of that software, as cybercriminals are able to secretly exploit the vulnerability in what's known as zero-day attacks. This white paper follows one real-life zero-day attack performed on an Adobe Flash Player vulnerability. It provides a detailed timeline of how the attack entered the network, what parts of the network it

  • Malwarebytes
  • Software
  • Enterprise
  • Details

Anti-Exploit Tools: The Next Wave of Enterprise Security

by MalwarebytesAug 31, 2015

From malware to ransomware to state-sponsored hacks, today's threat landscape is more complex and dangerous than ever. No organization, no matter how prepared it may think itself, is immune. However, if you're smart about managing the compromises that do occur, you may be able to keep yourself safe. In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them. Read on to learn how to protect your enterprise from today's

  • Malwarebytes
  • Software
  • Enterprise
  • Details

Rapid Weaponization of a Leaked Zero-day POC

by MalwarebytesAug 31, 2015

In early July, the Milan-based Hacking Team, an offensive security firm, were on the receiving end of a digital security breach. 400 GBs of internal documents with detailed info on software vulnerabilities and clear, concise instructions on how to exploit them leaked over the Internet. Our team of security researchers wanted to see how Malwarebytes Anti-Exploit stood its ground. By visiting known vulnerabilities, we triggered exploit attacks and measured how Anti-Exploit stood up to the evolving

  • Malwarebytes
  • Software
  • Enterprise
  • Details

17 Security Products Tested for Malware Removal and Repair

by MalwarebytesAug 31, 2015

Strong anti-malware is the backbone of your security strategy. No matter how good the rest of your network's security is, you will be compromised if you do not have good anti-malware in place. For that reason, making the right anti-malware choice is critical. This white paper can help you with that choice. It presents the results of a series of independent tests on seventeen different anti-malware products. Read it now for research-based guidance on how to choose the best anti-malware solution

  • Malwarebytes
  • Software
  • Information Management
  • Details

Sun Products Corporation Cleans Up Malware

by MalwarebytesAug 31, 2015

The Sun Products Corporation is a leading North American provider of laundry detergent, fabric softeners, and other household products. When Cryptolocker malware hit the company, it required weeks of cleanup efforts and was the final straw. In this case study, discover how they prevent recurring malware infections and protect against dangerous exploits.

  • Malwarebytes
  • Software
  • Enterprise
  • Details