Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Leverage Existing DLP Investments for Compliance

by SpirionNov 14, 2019

Read this case study to learn how a financial institution integrated Spirion's discovery and classification solution with their existing McAfee DLP to achieve comprehensive PCI compliance


Azure Information Protection: Optimized for Risk Management and Data Loss Prevention

by SpirionNov 14, 2019

Many organizations have the Microsoft Azure Information Protection (AIP) platform but are not able to optimize it. With the discovery of all structured and unstructured sensitive data and 2% false-positive rates, an organization can save both time and money. In this case study, find out how a leading pharmaceutical supplier bridged the gap for a unified solution, protecting all sensitive data.


The Data Torrent

by Dell EMC and AMDNov 13, 2019

Connected devices and the Internet of Things are driving exponential data growth. Over the next few years, the growth will happen at rocket speed. Buried in the rapidly accumulating data are insights that could lead to significant commercial innovation and scientific progress. Download this report to learn more.


Navigating the Deluge of Security Data

by Dark ReadingNov 01, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside: Navigating the Deluge of Security Data System logs, security tools, network telemetry, endpoint, and mobile


Cybersecurity is improving, but is it enough?

by eSentireNov 07, 2019

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire, examines advancements organizations have made in improving their cybersecurity posture, ongoing challenges to protect and secure the company's digital assets and how they are better positioning their organizations to contend with a dynamic and expanding cyberthreat landscape.
This research examines:


Rethinking Enterprise Data Defense

by Dark ReadingOct 22, 2019

What are the chief concerns of today's enterprise data defenders? What technologies and best practices do they find to be most effective in preventing compromises, and what methods have they found to make better use of their staffing and funding resources? In this survey we ask security professionals for insight on what they're doing that works - and what doesn't. Readers will get advice and recommendations from their peers on how to invest their IT security resources, and how to mitigate the


The Definitive Guide to Managed Detection and Response (MDR)

by eSentireOct 30, 2019

Get objective insights into the seven MDR categories and their associated strengths and weaknesses. This instructive eBook will help you make more informed cybersecurity choices that align with your business objectives, in-house security resources and risk tolerance levels. Read The Definitive Guide to MDR to learn about: The current marketplace definition of MDR Technical criteria and detailed questions to evaluate MDR providers The strengths and weaknesses for each of the seven


Assessing Cybersecurity Risk in Today's Enterprise

by Dark ReadingOct 29, 2019

Security leaders are struggling to understand their organizations' risk exposure. While many are confident in their security strategies and processes, they're also more concerned than ever about getting breached.

Dark Reading's annual 2019 Strategic Security survey reveals that many companies are uncertain about their data breach exposure because of growing threat sophistication, increasing attack volumes, and many other factors. A high percentage of IT leaders see employees as presenting


The Five Essential Capabilities of an Analytics-Driven SOC

by SplunkNov 14, 2018

Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks.This white paper dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels.


Zero Trust Internet: 100% Email & Web Security

by Menlo SecurityOct 22, 2019

The "detect and prevent" approach has reached its potential. Attackers have learned how to bypass this defense method. With Menlo Security's Internet Isolation Platform, you can achieve a Zero Trust Internet.

Learn: How companies can separate their enterprise network from the public web, while allowing employees seamless access to the Internet. How you can warn employees that they are on a phishing site, never having to worry about malware, viruses, or ransomware being downloaded.


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Dell EMC and AMD

As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in delivering the essential infrastructure for organizations to build their digital future, transform IT, and protect their most important asset -- information. Dell EMC enables IT and digital business transformation through trusted big data solutions, built on a modern data center infrastructure that incorporates industry-leading technologies.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company's cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience.The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway.


Spirion

Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.