Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

2020 State of Infrastructure Report

by InformationWeekFeb 14, 2020

Forecasts indicate that spending on digital transformation will reach $2 trillion by 2022. And, to support major new initiatives, organizations are investing in their infrastructure today, with an eye toward building a digital infrastructure for tomorrow. In this special report, you'll learn about key trends around overall spending, impacts on workforces, factors driving change, investment in innovation, key areas of infrastructure, and much more.

  • InformationWeek
  • Infrastructure
  • Data centers
  • Storage
  • Wireless
  • Details

Threat Hunting with Zeek Guide

by CorelightFeb 13, 2020

Threat hunting is a hypothesis-driven activity. Want to threat hunt in your network traffic, but unsure where to start? Download this threat hunting guide to learn key questions to ask and where in your network traffic you should hunt for answers.

  • Corelight
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Network Traffic Analysis Instrumentation Guide

by CorelightFeb 13, 2020

Network traffic analysis (NTA) can give defenders an enduring advantage against adversaries. Want to learn how and where to deploy NTA in your network? From egress points to data centers, download this NTA deployment guide and it will show you the way.

  • Corelight
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Shake the Box: How to get Encrypted Traffic Insights Without Decryption

by CorelightFeb 13, 2020

What happens when you can't decrypt? For privacy, cost, or performance reasons, decryption isn't always an optimal (or available) option. Don't give up, there are powerful threat insights that can be derived without decryption. Download this whitepaper to learn how.

  • Corelight
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

5 Ways to Get Better Data for Incident Response and Threat Hunting

by CorelightFeb 13, 2020

Download this whitepaper to find out how Corelight offers the 'Goldilocks' of network data between PCAP and Netflow, and enables IR teams to move up to 20x faster and unlock powerful new threat hunting capabilities.

  • Corelight
  • Security Management & Analytics
  • Security Monitoring
  • Details

ESG Whitepaper: Assessing Network Traffic Analysis (NTA) Requirements

by CorelightFeb 13, 2020

Evaluating NTA solutions but not sure what to prioritize? Download this free analyst report from ESG to understand what criteria to use.

  • Corelight
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details

How to Pick a Winner in EDR

by Palo Alto NetworksFeb 13, 2020

Understand the MITRE ATT&CK test results

Leveraging Forrester's scoring framework, this whitepaper compiles the findings of the MITRE ATT&CK Evaluation of EDR products and guides you on how to evaluate which detection and response product is right for your organization.

Download the paper to:

• Learn how to evaluate your security tools' effectiveness
• Develop a more effective and scalable strategy to secure your organization
• See how Cortex XDR™

  • Palo Alto Networks
  • Endpoint Security
  • Security Monitoring
  • Details

2020 Trends to Watch: Cybersecurity

by Palo Alto NetworksFeb 13, 2020

The Cybersecurity Trends to Watch in 2020

This report by analyst firm Ovum highlights the top 5 technology and market trends emerging to address the complex threat landscape of 2020.

Download this analyst report to see what technologies will drive scale and efficiency in cybersecurity through:

• Cloud
• Automated big data analytics
• The delivery of functionality as a service

Learn these 5 trends and the recommendations enterprises should take to

  • Palo Alto Networks
  • Security Monitoring
  • Security Management & Analytics
  • Details

Forrester Report - Now Tech: Enterprise Detection and Response, Q1 2020

by Palo Alto NetworksFeb 13, 2020

Forrester Report: Now Tech: Enterprise And Response, Q1

Enterprise detection and response (EDR) offerings improve detection, speed investigation, and provide remote remediation of compromised systems.

But which offering is the best for your organization given the diverse set of vendors that vary by size, functionality, geography, and vertical market focus?

Download this report to understand the value you can expect from an enterprise detection and response provider and best

  • Palo Alto Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Maximize the ROI of Detection and Response

by Palo Alto NetworksFeb 13, 2020

Advanced attackers can evade detection by stealing credentials and masquerading as legitimate users. In response, security teams must deploy multiple--often siloed--detection and response tools.

Read this whitepaper to find out how to save 44% when you:

• Lower operational costs by simplifying and speeding up investigations
• Reduce infrastructure costs by using extreme sensors and enforcement points
• Stop advanced threats with one product for all your

  • Palo Alto Networks
  • Security Management & Analytics
  • Security Monitoring
  • Details