Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Intelligent Phishing Defense Infographic

by CofenseNov 12, 2019

Technology alone can't protect your organization, but an intelligent phishing defense can, combining human intuition and advanced technology. Download this infographic to learn how to fight threats faster.


Q3 2019 Malware Trends of the Phishing Landscape

by CofenseNov 12, 2019

Cofense analyzes millions of email and malware samples to deliver unique insights on the threat landscape. Download this report to learn about the Q3 2019 malware trends in the phishing landscape to help you understand them and protect your organization


Network Detection and Response: Cloud Security's Missing Link

by ExtraHopNov 11, 2019

Digital transformation to the cloud is driving innovation, but it's also leaving cloud adopters open to new attack vectors.

Download "Network Detection and Response: Cloud Security's Missing Link" to see how this emerging cybersecurity category helps enterprises protect business-critical data and applications in the cloud.

This new eBook discusses how NDR solutions leverage cloud virtual taps to complete Gartner's SOC Visibility Triad (SIEM, EDR, and NDR) and fill analytics gaps in


Cybersecurity is improving, but is it enough?

by eSentireNov 07, 2019

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire, examines advancements organizations have made in improving their cybersecurity posture, ongoing challenges to protect and secure the company's digital assets and how they are better positioning their organizations to contend with a dynamic and expanding cyberthreat landscape.
This research examines:


Strategies for Protecting Mission-Critical Data

by Dark ReadingSep 09, 2019

Whether it?s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique ? the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker ? or even one of your own employees ? could break the security of that critical information. What steps should you be taking to protect it? Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading,


Strategies for Protecting Mission-Critical Data

by Dark ReadingSep 09, 2019

Whether it?s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique ? the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker ? or even one of your own employees ? could break the security of that critical information. What steps should you be taking to protect it? Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading,


The Future of Network Security Is in the Cloud

by Menlo SecurityNov 04, 2019

Gartner recommends, "Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced "sassy")."

Menlo Security offers the solution that delivers on Gartner's vision of network security in the cloud.

Find out how by downloading this report.


Rethinking Enterprise Data Defense

by Dark ReadingOct 22, 2019

What are the chief concerns of today's enterprise data defenders? What technologies and best practices do they find to be most effective in preventing compromises, and what methods have they found to make better use of their staffing and funding resources? In this survey we ask security professionals for insight on what they're doing that works - and what doesn't. Readers will get advice and recommendations from their peers on how to invest their IT security resources, and how to mitigate the


Secure Cloud Transformation

by Menlo SecurityOct 31, 2019

It's clear that security isn't keeping up with cloud transformation. It's time to close the gap and protect users from web and email cyberattacks as you migrate to using SaaS applications.

Read "Secure Cloud Transformation" to Learn: Why security has moved to the cloud yet has failed to adapt to the changing cloud paradigm How a cloud security platform powered by isolation fundamentally changes the way organizations protect users The top four requirements of a cloud-based security


The Definitive Guide to Managed Detection and Response (MDR)

by eSentireOct 30, 2019

Get objective insights into the seven MDR categories and their associated strengths and weaknesses. This instructive eBook will help you make more informed cybersecurity choices that align with your business objectives, in-house security resources and risk tolerance levels. Read The Definitive Guide to MDR to learn about: The current marketplace definition of MDR Technical criteria and detailed questions to evaluate MDR providers The strengths and weaknesses for each of the seven


SUBTOPICS:

Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company's cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience.The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway.