Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

Video/Webcast | Presented by TrustMAPP

Presenting to the Board of Directors: Communicating the Top Privacy and Security Topics to Executives

Board directors are increasingly concerned about cyber security and cyber risk. The subject has quickly trended upward on the World Economic Forum as the #1 business risk (2018). In this webinar we will explore preparation, communication and survival in the boardroom.

White Paper | Presented by TrustMAPP

TrustMAPP simplifies security performance management

You are charged with managing your organization’s risk and security.

White Paper | Presented by ConnectWise

Keep Cyber Threats from Destroying Your Company

Every company is a target, no matter its size, function or annual revenue. Security risks come from very direction - malware, social networks and even employees. Every company has information worth protecting, and you owe it to your users to keep every byte safe and secure.

White Paper | Presented by ThreatQuotient

Build or Buy? Answering the Eternal Technology Question

Threat intelligence platforms (TIPs) are at that inflection point and security teams are asking themselves, "Should we build or buy a TIP?" However, the better question to ask is, "Just because we could build one, should we?

White Paper | Presented by ThreatQuotient

The Buyer’s Guide to Threat Intelligence Platforms

Selecting the right threat intelligence platform is important as it will serve as the foundation for your entire threat operations programs, allowing you to understand and act upon the highest priority threats you face, while enabling you to get more from your existing resources - technology and people

White Paper | Presented by Veritas

IDG Access Paper: Why SDS is Essential for IT Transformation

This white paper, “Why SDS is Essential for IT Transformation,” helps you identify what to look for and what’s possible with SDS.

SOAR Like An Eagle: The Key to Fast & Full-Lifecycle Incident Response

Join Senior Principal Analyst and ESG Fellow, Jon Oltsik, and Director of Cyber Security at D3 Security, Stan Engelbrecht, CISSP, as they discuss the complexity of today’s security incidents and the need for organizations to utilize SOAR (Security Orchestration, Automation and Response) tools in order to seamlessly, and rapidly, coordinate the people, technology, and processes that make up their security infrastructure.

White Paper | Presented by BlackBerry

10 Reasons to Bring all your Endpoints Under One Roof

Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) are not equipped to manage the emerging Enterprise of Things (EoT), made up of all the IoT devices in today’s workplace. Find out why it’s time to secure all endpoints from a single console.

White Paper | Presented by LogRhythm

SANS Reviews LogRhythm CloudAI for UEBA

As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.

White Paper | Presented by LogRhythm

How to Deploy a SIEM Successfully by Gartner

SIEM deployments may stall or fail if not implemented with the right scope, use cases, data sources, architecture, expertise or staff size. Security and risk management leaders deploying a SIEM solution should follow this structured approach to ensure a successful implementation.

Load More