TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







EMA Report: TLS 1.3 Adoption in the Enterprise

by ExtraHopFeb 20, 2019

Read the new research from EMA on how encryption is impacting enterprises, and how they're preparing for even further transformation due to TLS 1.3 and perfect forward secrecy.


Reveal(x) Reviewer's Guide

by ExtraHopFeb 20, 2019

As you go through the guide, you will learn how Reveal(x) can help your organization increase efficiency and confidence through unprecedented visibility, definitive insights, and immediate answers.


Demisto Secures its AWS-based Container Pipeline

by Aqua Security Software Inc.Feb 20, 2019

Demisto integrates security into its container-based development pipeline and at every stage from image build to container deployment and runtime. This case study explains how.


2018 Security Report

by Check Point Software Technologies Ltd.Apr 28, 2018

From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks. Arm yourself with all the facts.


Cyber Attack Trends Report

by Check Point Software Technologies Ltd.Aug 15, 2018

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.


Cyber Security Guide for Executives

by Check Point Software Technologies Ltd.Oct 17, 2018

A guide for c-level executives to better understand the considerations around cybersecurity, how cyberattacks are evolving, and what to be aware of to lead a secure organization. Learn about the latest trends and how cybersecurity is changing from the perspectives of the attackers and the technologies.


Prevent Data Breaches in 8 Steps

by Check Point Software Technologies Ltd.Oct 19, 2018

Cyber criminals continue to unleash data breach attacks on organizations around the globe. In 2017, the average cost of a breach for a U.S. company was an estimated US$8 million. Such attacks are becoming more targeted, evasive, and lucrative. It's no long a matter of if, but when your organization will suffer a data breach. The good news is that the eight steps outlined in this paper can go far to prevent a targeted data breach.


Gartner Magic Quadrant for ENFW

by Check Point Software Technologies Ltd.Dec 18, 2018

Completeness of vision and ability to execute are just two reasons why Gartner named Check Point a Leader in the 2018 Magic Quadrant for Enterprise Network Firewalls. Get the details in this new report.


Practical Cyber Defense for Industrial Control Systems

by Nozomi NetworksJan 03, 2019

Industrial control systems (ICS) environments are being targeted by more sophisticated threats every day; but the security professionals who defend ICS environments face significant limitations. Patching practices and scanning tools that are common in most IT environments are often unacceptable for ICS, which may operate critical infrastructure and require 24/7 uptime. In this Dark Reading webinar, top experts offers insight on the threat posed to ICS systems, and how you can expand your


IoT Security for Connected Spaces - Frost and Sullivan WP

by Cloakware by IrdetoJul 30, 2018

The success of IoT deployments heavily depends on data security, privacy and device interoperability. However, many IoT endpoints used in Connected Spaces do not incorporate anything more than the very basic security measures.


SUBTOPICS:

Aqua Security Software Inc.

Headquarters: 800 District Avenue,  Suite 310 Burlington, MA 01803

Aqua Security enables enterprises to secure their container-based and cloud-native applications from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.


Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's Zone Labs (www.zonelabs.com) division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.


Cloakware by Irdeto

A security breach or a serious hack can be devastating to a company's brand. The damage - financial and reputational - could be so great that a business may never fully recover. Irdeto's Cloakware cybersecurity technology, products and solutions have been securing digital assets for 20 years. Irdeto was the inventor of whitebox cryptography and its Cloakware solutions are differentiated by its rich history of innovation and built-in diversity and renewability features.

Irdeto is a leader in cybersecurity and currently secures over 5 billion devices and applications as well as providing a wide range of security services for various industries, including media & entertainment, automotive and IoT connected industries.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo