UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Protecting Your Organization from Insider Threats

by Lockheed MartinSep 01, 2015

When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands - whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and enforcing some proactive measures can dramatically reduce the threat of sensitive data walking out the door.

This white paper discusses: Current risk factors - How sensitive data can fall into the wrong hands What you stand to lose from insider

  • Lockheed Martin
  • Risk Management/Security
  • Security Monitoring
  • Details

Anti-Exploit Tools: The Next Wave of Enterprise Security

by MalwarebytesAug 31, 2015

From malware to ransomware to state-sponsored hacks, today's threat landscape is more complex and dangerous than ever. No organization, no matter how prepared it may think itself, is immune. However, if you're smart about managing the compromises that do occur, you may be able to keep yourself safe. In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them. Read on to learn how to protect your enterprise from today's

  • Malwarebytes
  • Software
  • Enterprise
  • Details

17 Security Products Tested for Malware Removal and Repair

by MalwarebytesAug 31, 2015

Strong anti-malware is the backbone of your security strategy. No matter how good the rest of your network's security is, you will be compromised if you do not have good anti-malware in place. For that reason, making the right anti-malware choice is critical. This white paper can help you with that choice. It presents the results of a series of independent tests on seventeen different anti-malware products. Read it now for research-based guidance on how to choose the best anti-malware solution

  • Malwarebytes
  • Software
  • Information Management
  • Details

An Inside View of a Zero-day Campaign

by MalwarebytesAug 31, 2015

Cybercriminals work tirelessly to find new vulnerabilities in popular software-sometimes more tirelessly than the actual software developer. This spells disaster for users of that software, as cybercriminals are able to secretly exploit the vulnerability in what's known as zero-day attacks. This white paper follows one real-life zero-day attack performed on an Adobe Flash Player vulnerability. It provides a detailed timeline of how the attack entered the network, what parts of the network it

  • Malwarebytes
  • Software
  • Enterprise
  • Details

Rapid Weaponization of a Leaked Zero-day POC

by MalwarebytesAug 31, 2015

In early July, the Milan-based Hacking Team, an offensive security firm, were on the receiving end of a digital security breach. 400 GBs of internal documents with detailed info on software vulnerabilities and clear, concise instructions on how to exploit them leaked over the Internet. Our team of security researchers wanted to see how Malwarebytes Anti-Exploit stood its ground. By visiting known vulnerabilities, we triggered exploit attacks and measured how Anti-Exploit stood up to the evolving

  • Malwarebytes
  • Software
  • Enterprise
  • Details

Sun Products Corporation Cleans Up Malware

by MalwarebytesAug 31, 2015

The Sun Products Corporation is a leading North American provider of laundry detergent, fabric softeners, and other household products. When Cryptolocker malware hit the company, it required weeks of cleanup efforts and was the final straw. In this case study, discover how they prevent recurring malware infections and protect against dangerous exploits.

  • Malwarebytes
  • Software
  • Enterprise
  • Details

The State of Cloud Connectivity

by Comcast BusinessAug 28, 2015

IT managers are rethinking their reliance on the public Internet and Multiprotocol Label Switching (MPLS), the traditional standard used in wide area network environments, according to new research from UBM Tech.

The survey, sponsored by Comcast Business, revealed that organizations are intent on meeting key business goals, such as boosting employee productivity and reducing expenses associated with communications and IT operations. Some have turned to hosted cloud services to

  • Comcast Business
  • Cloud Services
  • Software as a Service
  • Details

A Checklist for Moving to the Cloud

by INetUAug 27, 2015

This checklist contains several areas to explore as you begin planning the move of your business operations to the cloud. The items and questions apply to most organizations regardless of what or how much you are moving. The checklist will help you identify your specific needs and help a potential cloud hosting provider identify the services and infrastructure to support your business.

  • INetU
  • Cloud Services
  • Cloud
  • Details

The Adventures of Moving to the Cloud

by INetUAug 27, 2015

43% of organizations experience failed or stalled cloud/hosting implementations. Moving to the cloud may seem like a walk in the park, but the path may be more treacherous than it seems. This infographic will guide you through the jungle that is the cloud and you will discover the common pitfalls and challenges of moving to the cloud and the keys to being successful.

  • INetU
  • Cloud Services
  • Cloud
  • Details

Application Security Webinar Series

by Rogue Wave SoftwareAug 27, 2015

In this three-part series you will hear from security experts as they address:

• How to ensure your code is bulletproof
• How to ensure your processes are secure
• Questions from your peers on how to best manage your application security.

  • Rogue Wave Software
  • Security Management & Analytics
  • Security
  • Security Monitoring
  • Details