TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

5 Must Haves for the 2019 Call Center

by TalkdeskJan 16, 2019

Creating or maintaining a modern call center requires you to stay up to date on innovation and proven principles. Join this session to gain in-the-know insight from some of the industry?s premier thought leaders on this year?s must haves. Transforming any operation can take time, but with these helpful insights you will walk away from this webinar with some useful suggestions to finalize your 2019 game plan.

  • Call Centers
  • Data
  • Metrics
  • Customer Experience
  • Details

Case Studies: Real World Incidents Detected and Stopped by Awake

by Awake SecurityJan 08, 2019

Now that security tools that have become proficient at identifying noisy, malware-based attacks, cyber criminals have adapted to using non-malware techniques in a majority of breaches. They rely on tools that already exist within the environment, abusing insider credentials or using SSL tunnels to legitimate sites for command and control. Attackers are also targeting the ever-growing population of non-traditional devices on the network, devices that often lack the same level of security

  • Awake Security
  • Cybersecurity
  • Security platforms
  • Details

EMA Radar Summary for Network-Based Security Analytics Q3 2018

by Awake SecurityJan 07, 2019

MAs evaluation is based on analysis of over 100 different KPIs in five primary categories: Deployment and Administration, Cost Advantage, Architecture and Integration, Functionality, and Vendor Strength.

Awake has been recognized for providing the greatest balance between features and costs when compared to a dozen other vendors evaluated in the Enterprise Management Associates Radar™ report on network security analytics.

"Network traffic analysis is proving to be a

  • Security Management & Analytics
  • Security Monitoring
  • Awake Security
  • Details

Embracing the Looming Challenge of 100% Encryption

by ExtraHopJan 04, 2019

This brief outlines the reasons enterprise SecOps teams need to be able to decrypt data for analysis, and walks through the pros and cons of two technical approaches.

  • ExtraHop
  • Security Management & Analytics
  • Security
  • Details

Gartner Report: 5 Questions That CISOs Must Answer Before Adopting Artificial Intelligence

by ExtraHopJan 04, 2019

Learn Gartner's recommendations for vetting artificial intelligence systems and seeing through the marketing fluff around overhyped AI tech.

  • ExtraHop
  • Network & Perimeter Security
  • Database Security
  • Details

ExtraHop Reveal(x) Technical Architecture

by ExtraHopJan 04, 2019

Take a look under the hood of ExtraHop Reveal(x) Network Traffic Analysis for the Enterprise

  • ExtraHop
  • Security Monitoring
  • Risk Management/Security
  • Details

Investigate East-West Attacks on Critical Assets with Network Traffic Analysis

by ExtraHopJan 04, 2019

This SANS Institute review tests out a workflow for investigating attacks using Reveal(x) Network Traffic Analysis for the enterprise.

  • ExtraHop
  • Security Management & Analytics
  • Security Monitoring
  • Details

Gartner Report: Align Net Ops and Sec Ops

by ExtraHopJan 04, 2019

Learn Gartner's take on how to get more value out of Sec Ops and Net Ops by aligning their initiatives.

  • ExtraHop
  • Security Monitoring
  • Security Management & Analytics
  • Details

2018 Threat Intelligence Report

by AlienVaultJan 04, 2019

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs.

This threat intelligence report, produced by Cybersecurity Insiders, explores how organizations are leveraging threat intelligence data, the benefits and most critical features of threat intelligence platforms, and the biggest cyber threats organizations are using their threat intelligence to combat.

  • Alienvault
  • Cybersecurity
  • Security Management & Analytics
  • Details

Beginner’s Guide to Open Source Incident Response Tools & Resources

by AlienVaultJan 04, 2019

In this beginner's guide, you'll read about the best open source tools for incident response, resources for how and when to use them, and how to determine the source of an attack.

Topics cover the three A's of incident response: Ammunition, Attribution and Awareness
• Ammunition - Finding the right open source tools for incident response
• Attribution - Identifying ownership on the anonymous internet
• Awareness - Emphasizing the importance of security at

  • Alienvault
  • Cybersecurity
  • Risk Management
  • Details