Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Threat Hunting with Zeek Guide

by CorelightFeb 13, 2020

Threat hunting is a hypothesis-driven activity. Want to threat hunt in your network traffic, but unsure where to start? Download this threat hunting guide to learn key questions to ask and where in your network traffic you should hunt for answers.

Network Traffic Analysis Instrumentation Guide

by CorelightFeb 13, 2020

Network traffic analysis (NTA) can give defenders an enduring advantage against adversaries. Want to learn how and where to deploy NTA in your network? From egress points to data centers, download this NTA deployment guide and it will show you the way.

Shake the Box: How to get Encrypted Traffic Insights Without Decryption

by CorelightFeb 13, 2020

What happens when you can't decrypt? For privacy, cost, or performance reasons, decryption isn't always an optimal (or available) option. Don't give up, there are powerful threat insights that can be derived without decryption. Download this whitepaper to learn how.

5 Ways to Get Better Data for Incident Response and Threat Hunting

by CorelightFeb 13, 2020

Download this whitepaper to find out how Corelight offers the 'Goldilocks' of network data between PCAP and Netflow, and enables IR teams to move up to 20x faster and unlock powerful new threat hunting capabilities.

ESG Whitepaper: Assessing Network Traffic Analysis (NTA) Requirements

by CorelightFeb 13, 2020

Evaluating NTA solutions but not sure what to prioritize? Download this free analyst report from ESG to understand what criteria to use.

How to Pick a Winner in EDR

by Palo Alto NetworksFeb 13, 2020

Understand the MITRE ATT&CK test results

Leveraging Forrester's scoring framework, this whitepaper compiles the findings of the MITRE ATT&CK Evaluation of EDR products and guides you on how to evaluate which detection and response product is right for your organization.

Download the paper to:

• Learn how to evaluate your security tools' effectiveness
• Develop a more effective and scalable strategy to secure your organization
• See how Cortex XDR™

2020 Trends to Watch: Cybersecurity

by Palo Alto NetworksFeb 13, 2020

The Cybersecurity Trends to Watch in 2020

This report by analyst firm Ovum highlights the top 5 technology and market trends emerging to address the complex threat landscape of 2020.

Download this analyst report to see what technologies will drive scale and efficiency in cybersecurity through:

• Cloud
• Automated big data analytics
• The delivery of functionality as a service

Learn these 5 trends and the recommendations enterprises should take to

Forrester Report - Now Tech: Enterprise Detection and Response, Q1 2020

by Palo Alto NetworksFeb 13, 2020

Forrester Report: Now Tech: Enterprise And Response, Q1

Enterprise detection and response (EDR) offerings improve detection, speed investigation, and provide remote remediation of compromised systems.

But which offering is the best for your organization given the diverse set of vendors that vary by size, functionality, geography, and vertical market focus?

Download this report to understand the value you can expect from an enterprise detection and response provider and best

Maximize the ROI of Detection and Response

by Palo Alto NetworksFeb 13, 2020

Advanced attackers can evade detection by stealing credentials and masquerading as legitimate users. In response, security teams must deploy multiple--often siloed--detection and response tools.

Read this whitepaper to find out how to save 44% when you:

• Lower operational costs by simplifying and speeding up investigations
• Reduce infrastructure costs by using extreme sensors and enforcement points
• Stop advanced threats with one product for all your

IT Careers: Tech Drives Constant Change

by InformationWeekFeb 12, 2020

Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. Tech concepts such as outsourcing, artificial intelligence and machine learning, data analytics, cloud, and DevOps are changing the game for every IT pro.

In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market, including: In-demand skills Where to go for advice on



From the Acropolis to the edge of space, defenders have sought the high ground in order to see farther and turn back attacks. Corelight delivers a commanding view of your network so you can outsmart and outlast adversaries. We capture, interpret, and connect the data that means everything to defenders


InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.