Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Threat Detection & Response Assessment

by BlumiraOct 08, 2020

Protecting against cyber threats in this era of remote work is more challenging than ever. Do you know if your organization has all of the capabilities to detect and respond to modern threats?

To help you do a gap analysis, Blumira has created a checklist of the different areas of threat detection and response — from logging to alerting to audits and compliance — so you can measure your current security maturity and identify any missing capabilities.


The Modern SIEM Evaluation Guide

by BlumiraOct 08, 2020

Traditional security information and event management (SIEM) solutions are overly complex, lack security insights and are costly and resource-intensive to deploy, manage and maintain. It's no wonder security and IT teams want to replace their legacy SIEMs.

This guide gives you a checklist of criteria to help you select a modern security platform that can meet your organization's needs, without significant overhead.

In this guide, you'll learn: Common challenges with the


Preventing Unwanted Guests in Your Mailboxes

by Adaptive ShieldOct 15, 2020

Shared mailboxes are commonly used in organizations today to enable multiple users to access the same email account. But due to their default settings, they may be enabling unwanted guests to access them as well.

Download this research report to learn: About the dangers of shared mailboxes How organizations can easily configure these entities to prevent infiltration How to get started with a proactive, automatic approach to preventing these and all SaaS misconfigurations


Worried About SaaS Misconfigurations? You Should Be.

by Adaptive ShieldOct 15, 2020

SaaS misconfigurations cost organizations dearly in terms of money and lost time each year. Even organizations that prioritize security often fail in this area, exposing themselves to major--and easily preventable--threats.

Download this eBook to learn: How SaaS misconfigurations can put organizations at risk The top 5 SaaS configuration settings organizations fail to address How to easily mitigate and fix these misconfigurations How to get started with an automatic approach to


SANS Guide to Evaluating Attack Surface Management

by RandoriOct 19, 2020

Attack surface management (ASM) is an emerging category that helps organizations better manage risk by providing an external perspective of their attack surface. This new SANS Report details how organizations are leveraging ASM to reduce risk, the critical capabilities any ASM solutions must offer and how to approach evaluating the effectiveness of ASM solutions.


7 Experts on Transforming Your Threat Detection & Response Strategy

by TrustwaveOct 14, 2020

Learn from 7 security experts as they offer insight on practical strategies, advice, and examples for transforming your threat detection and response.


IDC MarketScape: Worldwide Managed Security Services 2020 Vendor Assessment

by TrustwaveOct 14, 2020

Evolve your security capabilities with an innovative market leading Managed Security Service.


Five Ways Attackers Get to Databases

by TrustwaveOct 14, 2020

Stay ahead of cyber criminals and keep your data safe by how these threats create risk for your databases.


Effective Cyber Risk Assessment and Measurement

by CyberGRXAug 26, 2020

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today?s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.


Effective Cyber Risk Assessment and Measurement

by CyberGRXAug 26, 2020

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today?s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.


SUBTOPICS:

Adaptive Shield

Adaptive Shield addresses the challenge of SaaS misconfigurations across your entire application stack. We provide enterprises with a proactive, continuous, and complete SaaS security posture management solution that makes true native SaaS security simple.

Now you can automatically prevent misconfigurations and get total visibility to prevent cloud breaches and loss of valuable data. What's more, we support dozens of leading cloud apps including Office 365, Salesforce, Zoom, Slack and new app integrations are being added continuously.


Blumira

Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.


CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.


Randori

Randori is building the world's most authentic, automated attack platform to help defenders train like the adversary. Based on technology used to penetrate some of the world's largest and most secure organizations, Randori enables security leaders to regain control of their attack surface, prioritize like an attacker, and practice how they fight.


Trustwave

Trustwave is a leading cybersecurity and managed security services provider that helps businesses fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. Trustwave is a Singtel company and the global security arm of Singtel, Optus and NCS, with customers in 96 countries.