UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

An Inside View of a Zero-day Campaign

by MalwarebytesAug 31, 2015

Cybercriminals work tirelessly to find new vulnerabilities in popular software-sometimes more tirelessly than the actual software developer. This spells disaster for users of that software, as cybercriminals are able to secretly exploit the vulnerability in what's known as zero-day attacks. This white paper follows one real-life zero-day attack performed on an Adobe Flash Player vulnerability. It provides a detailed timeline of how the attack entered the network, what parts of the network it

  • Malwarebytes
  • Software
  • Enterprise
  • Details

Anti-Exploit Tools: The Next Wave of Enterprise Security

by MalwarebytesAug 31, 2015

From malware to ransomware to state-sponsored hacks, today's threat landscape is more complex and dangerous than ever. No organization, no matter how prepared it may think itself, is immune. However, if you're smart about managing the compromises that do occur, you may be able to keep yourself safe. In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them. Read on to learn how to protect your enterprise from today's

  • Malwarebytes
  • Software
  • Enterprise
  • Details

17 Security Products Tested for Malware Removal and Repair

by MalwarebytesAug 31, 2015

Strong anti-malware is the backbone of your security strategy. No matter how good the rest of your network's security is, you will be compromised if you do not have good anti-malware in place. For that reason, making the right anti-malware choice is critical. This white paper can help you with that choice. It presents the results of a series of independent tests on seventeen different anti-malware products. Read it now for research-based guidance on how to choose the best anti-malware solution

  • Malwarebytes
  • Software
  • Information Management
  • Details

The State of Cloud Connectivity

by Comcast BusinessAug 28, 2015

IT managers are rethinking their reliance on the public Internet and Multiprotocol Label Switching (MPLS), the traditional standard used in wide area network environments, according to new research from UBM Tech.

The survey, sponsored by Comcast Business, revealed that organizations are intent on meeting key business goals, such as boosting employee productivity and reducing expenses associated with communications and IT operations. Some have turned to hosted cloud services to

  • Comcast Business
  • Cloud Services
  • Software as a Service
  • Details

Application Security Webinar Series

by Rogue Wave SoftwareAug 27, 2015

In this three-part series you will hear from security experts as they address:

• How to ensure your code is bulletproof
• How to ensure your processes are secure
• Questions from your peers on how to best manage your application security.

  • Rogue Wave Software
  • Security Management & Analytics
  • Security
  • Security Monitoring
  • Details

The Adventures of Moving to the Cloud

by INetUAug 27, 2015

43% of organizations experience failed or stalled cloud/hosting implementations. Moving to the cloud may seem like a walk in the park, but the path may be more treacherous than it seems. This infographic will guide you through the jungle that is the cloud and you will discover the common pitfalls and challenges of moving to the cloud and the keys to being successful.

  • INetU
  • Cloud Services
  • Cloud
  • Details

A Checklist for Moving to the Cloud

by INetUAug 27, 2015

This checklist contains several areas to explore as you begin planning the move of your business operations to the cloud. The items and questions apply to most organizations regardless of what or how much you are moving. The checklist will help you identify your specific needs and help a potential cloud hosting provider identify the services and infrastructure to support your business.

  • INetU
  • Cloud Services
  • Cloud
  • Details

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security

by CloudPassageAug 25, 2015

The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.

  • CloudPassage
  • Cloud Services
  • Infrastructure as a Service
  • Details

Centuries Young Bank Readies for another Century of Progress

by Alcatel-LucentAug 24, 2015

With over 300 years of history and expertise in banking, the Bank is an international financial services provider engaged in personal banking, credit cards, corporate and investment banking and wealth management. Learn how they transitioned entirely to a private cloud with online, real-time access for both customers and trading partners using Nuage Networks VSP. Click to learn about the Banks success with a private cloud.

  • Alcatel-Lucent
  • Infrastructure as a Service
  • Cloud
  • Details

Five Threat Intelligence Traps to Avoid

by SymantecAug 24, 2015

Recent high-profile data breaches impacting organizations in all industries including retailers, health care organizations and government agencies have shown just how challenging today's cyberthreat landscape has become. Fortunately, threat intelligence, the act of collecting and interpreting threat information from various data sources to identify adversaries and their tools, tactics, and procedures, is available to help enterprises stay ahead of emerging threats. Learn how to use threat and

  • Symantec
  • Risk Management/Security
  • Cybersecurity
  • Details