TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

5 Signs You Need a Mobile Security Game Plan

by AppthoritySep 28, 2016

Mobile security is on everyone's to do list, but when do you know it's time for your enterprise to have a mobile security game plan? Appthority tackles that question in its lates eBook, 5 Signs You Need a Mobile Security Game Plan.

As mobile devices are used in enterprise environments more often and more extensively, the potential for mobile attacks and the risks to both corporate and personal data continue to increase. Privacy is also at risk as employees are targeted as a means to

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Enterprise Mobile Threat Update: Q3 2016

by AppthoritySep 28, 2016

The mobile threat landscape continues to evolve and the Appthority Enterprise Mobile Threat Team monitors trends and important developments in its quarterly threat updates. This quarter's update highlights a growing concern among enterprises around new breeds of mobile threats and shares insights on how changes in app store policies may be affecting the security of applications in enterprise environments.

In this update, we review two major vulnerability types surfacing in Android

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough

by AppthoritySep 28, 2016

Appthority's White Paper, Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough identifies key factors that illustrate why enterprises need to go beyond network perimeter security to incorporate mobile security.
Today's enterprise environments is mobile. Forward thinking CISOs and their teams are realizing that, as mobile is increasingly the way we work and play, having a mobile security strategy is as necessary as simply having a security strategy. Soon, in fact, there

  • Appthority
  • Mobile security
  • Mobile Devices
  • Details

Enterprise Mobile: The New Threat Vector

by AppthoritySep 28, 2016

Appthority's White Paper, Enterprise Mobile: The New Threat Vector delves into how employees' mobile devices are undermining your enterprise security efforts. Mobile devices are in fact a silent enabler for ever more successful breaches. Because risky apps on mobile devices leak private data that can be leveraged for spear-phishing or watering hole attacks, and risky apps also send sensitive corporate data to cloud storage or remote servers in locations such as in locations such as China and

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Hiding in Plain Sight: How a CASB with UBA Unmasks Insider Threats in the Cloud

by PalerraSep 27, 2016

According to IBM's 2015 Cyber Security Intelligence Index, 55% of cyber attacks were due to insiders. Yet, CISOs frequently overlook internal actors and instead focus on protecting their cloud services against external attackers - leaving a huge security gap.

How do you close that gap? Download our white paper to learn how you can implement a Cloud Access Security Broker (CASB) with built-in User Behavior Analytics (UBA) to thwart insider threats before they become costly and public

  • Palerra
  • Cloud Security
  • Security
  • Details

It(T) Matters: The Fuel for Financial Growth

by VMware AirWatch®Sep 26, 2016

Download this Financial Services Digest to learn how leading financial institutions are modernizing IT, securing legacy infrastructure, and speeding application delivery to pave the way for further innovation and business growth.

  • VMware AirWatch®
  • Payments
  • Mobile Devices
  • Core systems
  • Management
  • Details

The Branch of the Future: Connecting Physical Experiences with Digital Capabilities

by VMware AirWatch®Sep 26, 2016

Download this Financial Services Digest to learn how next-generation technology is enhancing financial services' customer experiences worldwide.

  • Mobile Devices
  • VMware AirWatch®
  • Core systems
  • Payments
  • Management
  • Details

Locking Down Print Security: Everything You Didn't Think You Needed to Know About Print Security

by Insight/HPSep 23, 2016

With security risks and requirements rising, printers are often overlooked when it comes to data protection. But the reality is printers are fair game when it comes to malware - and often an easy entry point for hackers.

  • Database Security
  • Security Monitoring
  • Insight/HP
  • Details

Printer and Embedded Device Security

by Insight/HPSep 23, 2016

With the increased cybersecurity threats impacting Corporate Information Technology (IT) Networks, security issues with embedded devices are often overlooked.

  • Cybersecurity
  • Security Monitoring
  • Insight/HP
  • Details

Delivering Transaction Clarity

by Envestnet YodleeSep 22, 2016

Envestnet Yodlee takes confusing transaction data and translates it into clear, easy-to-read information. Financial institution customers not only receive a clear merchant name, date, and amount, but also additional context like a simple description of the transaction.

  • Envestnet Yodlee
  • Business Intelligence
  • Risk Management/Security
  • Details