Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







5 Questions Your Email Security Vendor Doesn't Want You to Ask

by AvananOct 21, 2020

Email gateways like Proofpoint and Mimecast were designed to protect on-prem email, but when you moved to the cloud, it revealed 5 vulnerabilities that expose users to attack.

Read "5 Questions Your Email Security Vendor Doesn't Want You to Ask" to learn:

• Why SEGs can't block insider email attacks
• Why SEGs allow attackers to bypass the gateway
• How impersonation attacks get through SEGs


The 2020 Microsoft Advanced Threat Protection Report

by AvananOct 21, 2020

In the most thorough analysis of its kind, Avanan analysts classified over 500,000 malicious emails, sent to real mailboxes protected by Microsoft's Advanced Threat Protection (ATP). This research identified the types of attacks that were blocked by ATP or EOP, and the types of attacks that were missed by both.

Read "The Microsoft ATP Report" to learn:
• Why ATP misses at least 18% of malicious emails
• How ATP works in different environments
• Why


Top Threats to Cloud Computing: The Egregious 11

by ExtraHopMay 01, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways


Guide To Microsoft Security

by BlumiraOct 08, 2020

To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity.

In this guide, you'll learn: How to use built-in Windows tools like System Monitor for advanced visibility into Windows server logs How to configure Group Policy Objects (GPOs) to give you a deeper look into your Windows environment Free, pre-configured tools from Blumira you can use to easily automate


Threat Detection & Response Assessment

by BlumiraOct 08, 2020

Protecting against cyber threats in this era of remote work is more challenging than ever. Do you know if your organization has all of the capabilities to detect and respond to modern threats?

To help you do a gap analysis, Blumira has created a checklist of the different areas of threat detection and response — from logging to alerting to audits and compliance — so you can measure your current security maturity and identify any missing capabilities.


The Modern SIEM Evaluation Guide

by BlumiraOct 08, 2020

Traditional security information and event management (SIEM) solutions are overly complex, lack security insights and are costly and resource-intensive to deploy, manage and maintain. It's no wonder security and IT teams want to replace their legacy SIEMs.

This guide gives you a checklist of criteria to help you select a modern security platform that can meet your organization's needs, without significant overhead.

In this guide, you'll learn: Common challenges with the


Account Takeovers - How Organizations Try to Prevent Them & Why it's Not Enough

by Adaptive ShieldOct 15, 2020

Account Takeovers are a major problem for organizations. Due to misconfigurations in SaaS applications, attackers can easily get access to legitimate credentials to make their way inside systems.

Download this article to learn: Why SaaS misconfiguration-based account takeovers are so common How they happen Why current prevention methods are falling short How organizations can automatically and proactively prevent SaaS misconfiguration-based ATOs


Worried About SaaS Misconfigurations? You Should Be.

by Adaptive ShieldOct 15, 2020

SaaS misconfigurations cost organizations dearly in terms of money and lost time each year. Even organizations that prioritize security often fail in this area, exposing themselves to major--and easily preventable--threats.

Download this eBook to learn: How SaaS misconfigurations can put organizations at risk The top 5 SaaS configuration settings organizations fail to address How to easily mitigate and fix these misconfigurations How to get started with an automatic approach to


SANS Guide to Evaluating Attack Surface Management

by RandoriOct 19, 2020

Attack surface management (ASM) is an emerging category that helps organizations better manage risk by providing an external perspective of their attack surface. This new SANS Report details how organizations are leveraging ASM to reduce risk, the critical capabilities any ASM solutions must offer and how to approach evaluating the effectiveness of ASM solutions.


7 Experts on Transforming Your Threat Detection & Response Strategy

by TrustwaveOct 14, 2020

Learn from 7 security experts as they offer insight on practical strategies, advice, and examples for transforming your threat detection and response.


SUBTOPICS:

Adaptive Shield

Adaptive Shield addresses the challenge of SaaS misconfigurations across your entire application stack. We provide enterprises with a proactive, continuous, and complete SaaS security posture management solution that makes true native SaaS security simple.

Now you can automatically prevent misconfigurations and get total visibility to prevent cloud breaches and loss of valuable data. What's more, we support dozens of leading cloud apps including Office 365, Salesforce, Zoom, Slack and new app integrations are being added continuously.


Avanan

Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™, and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite, with a patented solution that goes far beyond any other Cloud Email Security Supplement.


Blumira

Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Randori

Randori is building the world's most authentic, automated attack platform to help defenders train like the adversary. Based on technology used to penetrate some of the world's largest and most secure organizations, Randori enables security leaders to regain control of their attack surface, prioritize like an attacker, and practice how they fight.


Trustwave

Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries.