TECH DIGITAL RESOURCE LIBRARY

Whitepaper: Card-Not-Present Fraud in a Post-EMV Environment

by EMCSep 02, 2014

This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.


Whitepaper: Consumer Web Portals at Risk

by EMCSep 02, 2014

This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.


Whitepaper: Enterprise Strategy Group Report: The Big Data Security Analytics Era is Here

by EMCSep 02, 2014

Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.


Whitepaper: Transform Traditional Security Strategies into an Early Warning System for Advanced Threats

by EMCSep 02, 2014

To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.


Whitepaper: Building an Intelligence-Driven Security Operations Center

by EMCSep 02, 2014

This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.


Whitepaper: The Industrialization of Fraud

by EMCMay 25, 2014

Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence - driven techniques to redefine fraud risk.


Whitepaper: Combating Digital Fraud

by EMCMay 25, 2014

Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce.


Whitepaper: Solution Brief: Implementing a Security Analytics Architecture

by EMCMay 25, 2014

New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.


Whitepaper: Analyst Report: ESG Big Data Security Analytics Era is Here

by EMCMay 25, 2014

Big data security analytics is no longer a visionary idea - leading enterprises recognize that their immediate security requirements demand this type of solution.


Whitepaper: White Paper: Changing the Security Monitoring Status Quo

by EMCMay 25, 2014

The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.