TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Choosing the Right Strategies for Endpoint Security

by Deep InstinctJan 22, 2019

There are many tools for protecting enterprise endpoints from attack, but most organizations still do not have a comprehensive strategy for endpoint protection that extends across the enterprise. In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.


Consistency is Key with Cloud Security

by FireMon (Secure Passage)Jan 17, 2019

When it comes to cloud security, consistency is everything ? your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments. Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices ? particularly when the right security personnel are excluded from the


Phishing by Industry Benchmarking Report

by KnowBe4Jan 17, 2019

Every security leader faces the same conundrum: even as they increase their investment in sophisticated security orchestration, cybercrime continues to rise. Often security seems to be a race between effective technology and clever attack methodologies. Yet there's an overlooked layer that can radically reduce an organization's vulnerability: security awareness training and frequent simulated social engineering testing.

This report includes baseline phish-prone percentages by

  • KnowBe4
  • Cybersecurity
  • Risk Management/Security
  • Details

5 Must Haves for the 2019 Call Center

by TalkdeskJan 16, 2019

Creating or maintaining a modern call center requires you to stay up to date on innovation and proven principles. Join this session to gain in-the-know insight from some of the industry?s premier thought leaders on this year?s must haves. Transforming any operation can take time, but with these helpful insights you will walk away from this webinar with some useful suggestions to finalize your 2019 game plan.

  • Call Centers
  • Data
  • Metrics
  • Customer Experience
  • Details

Case Studies: Real World Incidents Detected and Stopped by Awake

by Awake SecurityJan 08, 2019

Now that security tools that have become proficient at identifying noisy, malware-based attacks, cyber criminals have adapted to using non-malware techniques in a majority of breaches. They rely on tools that already exist within the environment, abusing insider credentials or using SSL tunnels to legitimate sites for command and control. Attackers are also targeting the ever-growing population of non-traditional devices on the network, devices that often lack the same level of security

  • Awake Security
  • Cybersecurity
  • Security platforms
  • Details

EMA Radar Summary for Network-Based Security Analytics Q3 2018

by Awake SecurityJan 07, 2019

MAs evaluation is based on analysis of over 100 different KPIs in five primary categories: Deployment and Administration, Cost Advantage, Architecture and Integration, Functionality, and Vendor Strength.

Awake has been recognized for providing the greatest balance between features and costs when compared to a dozen other vendors evaluated in the Enterprise Management Associates Radar™ report on network security analytics.

"Network traffic analysis is proving to be a

  • Security Management & Analytics
  • Security Monitoring
  • Awake Security
  • Details

Embracing the Looming Challenge of 100% Encryption

by ExtraHopJan 04, 2019

This brief outlines the reasons enterprise SecOps teams need to be able to decrypt data for analysis, and walks through the pros and cons of two technical approaches.

  • ExtraHop
  • Security Management & Analytics
  • Security
  • Details

Gartner Report: 5 Questions That CISOs Must Answer Before Adopting Artificial Intelligence

by ExtraHopJan 04, 2019

Learn Gartner's recommendations for vetting artificial intelligence systems and seeing through the marketing fluff around overhyped AI tech.

  • ExtraHop
  • Network & Perimeter Security
  • Database Security
  • Details

ExtraHop Reveal(x) Technical Architecture

by ExtraHopJan 04, 2019

Take a look under the hood of ExtraHop Reveal(x) Network Traffic Analysis for the Enterprise

  • ExtraHop
  • Security Monitoring
  • Risk Management/Security
  • Details

Investigate East-West Attacks on Critical Assets with Network Traffic Analysis

by ExtraHopJan 04, 2019

This SANS Institute review tests out a workflow for investigating attacks using Reveal(x) Network Traffic Analysis for the enterprise.

  • ExtraHop
  • Security Management & Analytics
  • Security Monitoring
  • Details