Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by Neustar

Neustar Research shows large attacks growing as multi-vector exploits increasingly become the norm

In this report, Neustar, Inc., a trusted, neutral provider of real-time information services highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year.

White Paper | Presented by Neustar

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security and Pilfer Personal Data.

White Paper | Presented by Neustar

Neustar Named Market Leader for DDoS Prevention Solutions

Neustar SiteProtect NG offers 10+ Tbps of DDoS mitigation, the largest dedicated data scrubbing network in the world, so you can maintain your online presence.

White Paper | Presented by ConnectWise

Keep Cyber Threats from Destroying Your Company

Every company is a target, no matter its size, function or annual revenue. Security risks come from very direction - malware, social networks and even employees. Every company has information worth protecting, and you owe it to your users to keep every byte safe and secure.

White Paper | Presented by ThreatQuotient

Build or Buy? Answering the Eternal Technology Question

Threat intelligence platforms (TIPs) are at that inflection point and security teams are asking themselves, "Should we build or buy a TIP?" However, the better question to ask is, "Just because we could build one, should we?

White Paper | Presented by ThreatQuotient

The Buyer’s Guide to Threat Intelligence Platforms

Selecting the right threat intelligence platform is important as it will serve as the foundation for your entire threat operations programs, allowing you to understand and act upon the highest priority threats you face, while enabling you to get more from your existing resources - technology and people

White Paper | Presented by Veritas

IDG Access Paper: Why SDS is Essential for IT Transformation

This white paper, “Why SDS is Essential for IT Transformation,” helps you identify what to look for and what’s possible with SDS.

White Paper | Presented by BlackBerry

10 Reasons to Bring all your Endpoints Under One Roof

Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) are not equipped to manage the emerging Enterprise of Things (EoT), made up of all the IoT devices in today’s workplace. Find out why it’s time to secure all endpoints from a single console.

White Paper | Presented by LogRhythm

SANS Reviews LogRhythm CloudAI for UEBA

As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.

White Paper | Presented by LogRhythm

How to Deploy a SIEM Successfully by Gartner

SIEM deployments may stall or fail if not implemented with the right scope, use cases, data sources, architecture, expertise or staff size. Security and risk management leaders deploying a SIEM solution should follow this structured approach to ensure a successful implementation.

Load More
Popular Resources