TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Dark Reading Virtual Event 2019

by Dark ReadingMar 19, 2019

Pending


2019 Cyber Security Report

by Check Point Software Technologies Ltd.Mar 21, 2019

Learn about the security threat predictions and recommendations on how to survive today's targeted cyber attacks in the new 2019 Cyber Security Report.


NSS Labs 2019 Advanced Endpoint Protection Report

by Check Point Software Technologies Ltd.Mar 21, 2019

Check Point's SandBlast Agent earned NSS "Recommended" status in Advanced Endpoint Protection (AEP) test. Check Point scored 100% block rate of HTTP, email, offline threats and evasions. Download the report.


How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by Deep InstinctFeb 05, 2019

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? (ML) to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this enlightening Dark Reading webinar, a top expert will offer some useful definitions of terms and will discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT


4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.


7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.


Disrupting Lateral Movement

by SecureWorksJan 28, 2019

Attackers don't have to hit your most critical assets directly -they'll find a soft spot in your perimeter defenses and move laterally through your environment until they reach their target. In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.


2019 Ponemon Report: The Value of Threat Intelligence from Anomali

by AnomaliMar 14, 2019

The Ponemon Institute surveyed over 1,000 security professionals in the United States and the United Kingdom

The survey covered a range of threat intelligence topics, participants included in the survey utilize threat intelligence as part of their cybersecurity programs.

Results show that participants strongly believe in the importance and value of threat intelligence data but are struggling to maximize its effectiveness in detecting cyber threats. They call the lack of progress in


Organizing the Hunt for Cyber Threats with MITRE ATT&CK

by AnomaliMar 14, 2019

The first step to outsmarting your enemies-- think like them

Today's security teams are fully occupied reacting to the volumes of organizational data on potential malicious activity. Responding to a high volume of alarms can leave very little time for strategy or improving the overall security environment.

Organizations are harnessing MITRE ATT&CK to understand their adversaries and strengthen their defenses. The ATT&CK framework structures comprehensive information on attacker


Gartner Report: Market Guide for Network Traffic Analysis

by ExtraHopMar 12, 2019

Gartner's Neil Macdonald identified Network Traffic Analysis as one of the Top Technologies for Security in 2017. Now, in their inaugural Market Guide for Network Traffic Analysis, Gartner states that:

"To improve the detection of suspicious network traffic, security and risk management leaders should:
• Implement behavioral-based network traffic analysis tools to complement signature-based detection solutions
• Include NTA-as-a-feature solutions in their


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.