Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Security for the Internet of Radios - How to Protect the Enterprise from Radio Frequency Threats

by BastilleOct 21, 2016

We all know Wi-Fi uses radio to communicate, but so do the other 99 plus protocols that make up the world of mobile, cellular and the Internet of Things (IoT). All these new radio enabled devices bring with them new invisible threats. Enterprises will need to be able to react to new threats entering their environments through the Internet of Radios. This guide will introduce a new technology that is giving corporations new situational awareness, helping to prevent data ex filtration, and saving

Gartner Report: The Five Models of Security Operation Centers

by Arctic Wolf NetworksAug 16, 2016

Gartner outlines the five models of Security Operation Centers and provides practical guidance to CISOs planning to build a SOC capability.

Read this paper for key insights on:
• Why SOCs are being adopted by more mid-sized organizations
• Security functions and benefits offered by SOCs
• Overview of the five models and how they differ
• Evaluation criteria-how to determine which SOC fits your business objectives

FAQ: Managed Detection and Response

by Arctic Wolf NetworksAug 16, 2016

Managed Detection and Response (MDR) services differ from traditional managed security services (MSS) because they focus on threat detection and remediation versus device management and basic alerting.

Read this FAQ to learn:
• Who benefits most from MDR services
• Why MSSPs can't deliver MDR
• If MDR or SIEM is a better fit for your organization
• Why AWN CyberSOC is the best choice for MDR

FAQ: Incident Response

by Arctic Wolf NetworksOct 18, 2016

Most organizations are likely to suffer security breaches that arrive through daily business operations or external attacks. When this happens, the people, processes, and technology that are used to detect and mitigate the effects of the attack are collectively known as incident response (IR).

Read this FAQ to learn:
• Who is responsible for IR in a company
• Why IR goes beyond IT and is an organization-wide process
• Who should be on the IR team

6 Big Sales and Marketing Challenges Solved

by Dell EMC / Intel®Oct 13, 2016

In-memory technology is driving down the cost and complexity of predictive analytics for sales and marketing, enabling smaller teams to uncover valuable insights. Check out this whitepaper for six ways sales and marketing can use the predictive analytics solution from Dell EMC, SAP and Intel to convert prospects into customers.

How to Restore Trust After Breach

by TripwireOct 13, 2016

When an organization has been compromised, some of the first questions to ask are critical:

"Which systems can I trust?"
"What was done to compromise my systems or data?"
"How quickly can I figure out where I stand?"
Tripwire is often contacted after the fact to help answer these all-to-common questions.

This paper explains the five steps an organization can take, even if they haven't previously used or installed Tripwire solutions such as Tripwire

The Executive's Guide to the Top 20 Critical Security Controls

by TripwireOct 13, 2016

Looking for executive guidance that can help your organization strengthen the foundation of your security program so your organization will be safer from cyber attacks?

Written by a security and compliance architect, this book describes and distills the top 20 critical security controls, and offers practical implementation advice, dependencies and suggestions that improve the efficiency of each control. The genesis of this e-book was a series of detailed posts on Tripwire's The State

Twenty Critical Security Questions

by TripwireOct 13, 2016

This booklet/poster takes you step-by-step through the 20 Critical Security Controls, with an additional section that focuses on the first four fundamental controls. A convenient table allows you to rank your own specific needs against NSA rankings.

Endpoint Security Survival Guide

by TripwireOct 13, 2016

A proactive cyber security defense is the best strategy for protecting your business against cyber threats. In the past, security approaches have focused on understanding attacks to stop cybercriminals from accessing corporate networks and systems, but this approach is becoming less effective.

Endpoint Detection and Response (EDR) is a new, proactive approach that focuses on behavior that indicates an attack is underway rather than just indicators of compromise (IoC). EDR relies on

Using Code42 to Recover From Ransomware

by Code42Oct 10, 2016

Ransomware infections are up 87% in the last year — more than 47% of businesses have already been a victim. Ransomware remediation is fast and easy; see how you can recover files from ransomware's grip.


Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


Launched in 2014, Bastille is the leader in enterprise threat detection through software-defined radio. Bastille provides full visibility into the known and unknown mobile, wireless and Internet of Things devices inside an enterprise's corporate airspace-together known as the Internet of Radios. Through its patented software-defined radio and machine learning technology, Bastille senses, identifies and localizes threats, providing security teams the ability to accurately quantify risk and mitigate airborne threats that could pose a danger to network infrastructure. For more information, visit and follow on Twitter @bastillenet.

Dell EMC / Intel®

Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.


Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats.