TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to Build a Security Operations Center (on a Budget)

by AlienVaultMar 31, 2017

Get all 5 chapters of AlienVault's How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

The chapters you'll read focus on:
• The roles and responsibilities involved in a security operations team
• The key processes


Beginner's Guide to Ransomware Prevention & Detection

by AlienVaultOct 13, 2017

If you haven't had first-hand experience with ransomware in the past, chances are you've heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year.

In this whitepaper, we'll cover ransomware basics and provide best practices for ransomware prevention and detection.


Beginner's Guide to Threat Intelligence

by AlienVaultJul 30, 2018

A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus on scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answer.

In this AlienVault beginner's guide, you'll learn about:

• Different threat intelligence sources
• Why threat intelligence is critical for threat detection
• The benefits of threat


Beginner's Guide to Brute Force & DDoS Attacks

by AlienVaultJul 30, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force


Email and the Web - Go Great Together for Attackers, But What About for the Defenders?

by Mimecast North America, Inc.Aug 15, 2018

According to the Verizon Data Breach Investigations Report 2018, 92% of malware, such as ransomware, trojans, and RATs were delivered via malicious email attachments, with most of the remainder delivered via the web.

With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their malicious work? And how you


Open Source Network Security Tools for Beginners

by AlienVaultSep 25, 2018

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

In this whitepaper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

You'll learn about using open source tools for:

• Network discover
• Network IDS
• Vulnerability scanning


10 Endpoint Security Problems Solved by the Cloud for Kaspersky Users

by Carbon BlackSep 21, 2018

According to IDC, 70% of successful breaches begin at the endpoint. If you're a Kaspersky customer, and still have breaches in your endpoint security, then something isn't working. Perhaps you're struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues.


10 Endpoint Security Problems Solved by the Cloud for McAfee Users

by Carbon BlackSep 21, 2018

According to IDC, 70% of successful breaches begin at the endpoint. If you're a McAfee customer, and still have breaches in your endpoint security, then something isn't working. Perhaps you're struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues.


How the Cloud Solves 10 Endpoint Security Problems for SMBs

by Carbon BlackSep 21, 2018

Small and medium size businesses (SMBs) are facing massive cyber security challenges. In fact, according to the Verizon 2017 Data Breach Investigations report, 61% of breach victims in the previous year were businesses with fewer than 1000 employees.


SMBs Adopt Modern Endpoint Security

by Carbon BlackSep 21, 2018

A recent IDC survey of U.S. small and midsize businesses (SMBs) found that security is now a top IT spending priority for SMBs. But can SMBs truly keep up with the evolving threat landscape? IDC Research Director for Security Products Robert Westervelt candidly answers 5 important questions for SMBs about endpoint security.


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.