Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Endpoint Security Buyers Guide

by SophosOct 07, 2015

See how the different security vendors stack up. Get an overview of endpoint security features, and capabilities, including next-gen technologies. Compare the leading vendors including Sophos, Symantec, McAfee, Kaspersky, Microsoft, Bitdefender, Trend Micro, SentinelOne, and CrowdStrike. See a summary of analyst reports from Gartner, Forrester, SE Labs, MRG Effitas, and AV Comparables.


The State of Ransomware 2021

by SophosOct 05, 2021

5,400 IT professionals from 30 countries responded to this year's State of Ransomware Report, revealing fresh insights into the frequency of ransomware attacks, how much hackers are demanding when data is encrypted — and if paying up actually works. In this report you'll find: How often cybercriminals succeed in encrypting data Which sectors are most likely to pay the ransom The average ransom paid by small and mid-sized organizations How much data victims get back after


Extended Detection and Response (XDR) - Beginner's Guide

by SophosOct 05, 2021

XDR (Extended Detection and Response) is a very hot topic in the cybersecurity world. Going beyond the endpoint and server to incorporate firewall, email and other data sources into your IT operations and threat hunting tasks is more important than ever before.

But what exactly is XDR? How can it benefit your organization? And how is it different from Endpoint Detection and Response (EDR)?

Read this beginner's guide for an introduction to Extended Detection and Response. It


Endpoint Best Practices to Block Ransomware

by SophosOct 05, 2021

Over 50% of organizations were hit by ransomware in the last year.* Is your endpoint protection solution optimally configured to protect against these devastating attacks?

Read this guide to: Learn how ransomware attacks work Discover the seven endpoint-protection best practices all organizations should deploy Get top security tips to help keep ransomware at bay

*The State of Ransomware 2020


How Enterprises are Attacking the Cybersecurity Problem

by Dark ReadingSep 29, 2021

Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats. The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's


Securing Multi-Cloud Environments with VM-Series Virtual Firewalls

by Palo Alto Networks, Inc.Sep 28, 2021

Protect Your Organization in Public and Private Clouds

Organizations are facing a host of complex challenges as they navigate their cloud journeys. From lack of visibility to an increased attack surface, successfully overcoming these obstacles can seem like an uphill battle.

Read this in-depth white paper to see why VM-Series virtual firewalls are vital for your public cloud security and multi-cloud journey. You'll learn how to get critical application threat prevention with


Forrester's Planning for Failure: How to Survive a Breach

by Palo Alto Networks I Unit 42Sep 03, 2021

You may not stop every cyberattack, but you can avoid the worst effects of a security failure if you have a plan.

Forrester's new report, "Planning for Failure: How to Survive a Breach," covers: Planning for the legal and regulatory complexity of a security breach How to initiate an incident response program, including internal testing and training The benefits of preparation to boost customer trust

Get your complimentary security report now.


Unit 42 Incident Response and Data Breach Report

by Palo Alto Networks I Unit 42Sep 03, 2021

Does your organization have the security it needs to outpace new, advanced threats?

Download the 2020 Unit 42 Incident Response and Data Breach Report to learn rich insights into real-world cyber risks and practical advice for protecting your organization, including: Analysis of the top cybersecurity risks by industry Best practices and tips for each risk area Detailed looks into incidents types Equip your organization with the expertise to mitigate cyber risks. Download


2021 Unit 42 Ransomware Threat Report

by Palo Alto Networks I Unit 42Sep 03, 2021

As threat actors continue developing new and updated ransomware variants, how can your organization stay proactive?

Download the "2021 Unit 42 Ransomware Threat Report" to learn: Top ransomware threats and how to identify them Which industries are seeing an increase in ransomware attacks and why Ransomware's future and how you can prepare for what's next Take the first step toward a stronger ransomware prevention and protection strategy. Download the threat report now.


Security Outcomes Study: Financial Services Industry

by CiscoSep 13, 2021

Formerly titled the CISO Benchmark Report, this annual report showcases the data we collected from a double-blind study of more than 4800 respondents from 25 countries. The results were independently analyzed by research firm Cyentia to provide cybersecurity leaders everywhere the data they need to make informed decisions.


SUBTOPICS:

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Palo Alto Networks I Unit 42

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Unit 42 brings together an elite group of cyber researchers and incident responders to protect our digital way of life. With a deeply rooted reputation for delivering industry-leading threat intelligence, Unit 42 has expanded its scope to provide state-of-the-art incident response and cyber risk management services. Our consultants will serve as trusted partners to rapidly respond to and contain threats so you can focus on your business. Visit unit42.paloaltonetworks.com.


Palo Alto Networks, Inc.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.


Sophos

Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today's most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.