Resource Library
Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.
Deloitte + Google Cloud: Future of the SOC
This white paper, written jointly by Deloitte and Google Cloud, defines the key factors that are shaping the modern Security Operations Centre and the challenges SOCs must overcome.
Deloitte + Google Cloud: Future of the SOC Part 2
The second article of the “Future of the Security Operations Center (SOC)” series discusses what is arguably the most important component of a SOC—its people. Geared towards cyber security practitioners, including those who are just beginning their journey in security operations, as well as SOC leaders who are wrestling with finding the desired balance between outsourcing and insourcing their operations, this article conceptualizes the problems and reimagines solutions for the people side of your SOC.
ESG: Analyzing the Economic Benefits of Google Chronicle Security Analytics Platform
Never before has it been so critical for security teams to effectively secure the infrastructure for an increasingly remote workforce while they themselves may have limited physical access to on-premises resources. Those organizations that can deploy their security analytics and operations in the cloud are in a better position to continue to provide a secure infrastructure to the business.
Managed Solutions Apache Cassandra
Apache Cassandra® is the database of choice for applications requiring the highest levels of reliability, scalability, and performance.
Managed Solutions Apache Kafka®
Apache Kafka® is a leading streaming and queuing technology for largescale, always-on applications. It comes with built-in features of horizontal scalability, high-throughput, and low-latency.
Redefining Security Analytics with Chronicle
The threats and technology environments around us have changed radically. Security professionals lament that they must manage threats that originated in the 1980s, which means that old threats never leave; new threats simply pile on.
Taking the Right Actions Faster: Enhanced Threat Intelligence in McAfee™ Deployments
The volume of available threat data has increased dramatically over the last decade, gradually becoming a cacophony of noise.
Ten Rules For Managing Kafka
Much like its namesake, Apache Kafka® can be an inscrutable beast for the uninitiated. If you dive in and just try to “wing it,” you are likely to make mistakes. Kafka is not difficult to use but it is tricky to optimize.
The Advantages of Speed and In-Memory Databases
This white paper first analyzes the business value derived from low latency applications, it then examines some architectural patterns for in-memory databases, and finally looks at the leading in-memory database and our recommendations.
The business imperative for migrating SAP to the cloud — at your own pace
For organizations looking to improve operations and gain competitive advantage, the next phase of digital transformation involves shifting business-critical applications, including SAP workloads, to the cloud.