Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by ReliaQuest

3 Steps to Securing Enterprise Data on Cloud Platforms

Assuming security of data stored on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) is dangerous and potentially costly. The truth is, these cloud platforms offer excellent security options, but require proper configuration and monitoring to ensure consistent security.

White Paper | Presented by ReliaQuest

451 Research Report: Tackling the Visibility Gap in Information Security

451 Research recently published insights gathered from in-depth interviews with security leaders across 150 large enterprises to better understand the most critical challenges facing their teams.

White Paper | Presented by ReliaQuest

5 Approaches to a Consistently Evolving Security Program

The difficulty and expense of IT security can place a heavy burden on enterprises and their security teams. But when executed correctly, a consistently evolving security program can help manage costs and drive value beyond cybersecurity by delivering key strategic data analysis and insights to other departments.

White Paper | Presented by ReliaQuest

Application Logging Challenges in Cybersecurity

Logging events from applications is an important process in cybersecurity. Whether it’s a custom-built application, or one hosted by a third-party company, logging and monitoring these applications is necessary to get full visibility into your environment. This type of logging doesn’t come without its share of challenges.

White Paper | Presented by ReliaQuest

Security Program Health Monitoring Guide

Building preventive processes that minimize disruption and support tool efficacy Security program health monitoring is an often-overlooked process that’s critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.

White Paper | Presented by ReliaQuest

Top 5 Log Sources you should be ingesting, but probably aren’t

The key to minimizing security threats and maximizing business insights is logging and monitoring all relevant events from across and enterprise IT environment — but some data sources present unique logging challenges, often leaving them unmonitored and vulnerable to attack.

White Paper | Presented by ReliaQuest

Overly Managed Security

Over the past ten years, the cybersecurity market has exploded with tools, technologies, platforms, and service providers, who got into the business of security for the same reason most people get into any business: to help solve a problem.

White Paper | Presented by ReliaQuest

3 Steps to Securing Enterprise Data on Cloud Platforms

Many of today’s security teams are seeking guidance on how to manage security on cloud platforms platforms. The secret to success starts with understanding the common platform risks inherent in cloud technologies. Form threat protection to GDPR compliance, security teams have a lot to consider when configuring their environment for a cloud platform.

White Paper | Presented by ReliaQuest

5 Approaches to a Consistently Evolving Security Program

The background noise surrounding cybersecurity can be deafening to the enterprise security teams tasked with securing their organizations around the clock. These teams are made up of dedicated professionals who understand not only cyber challenges and threats, but also the opportunity to help secure their organization and provide value beyond security by leveraging the vast amount of data they access each day

White Paper | Presented by ReliaQuest

Application Logging Challenges

This white paper will take a deep dive into the various layers in these applications, and some logging practices for each. Database servers, underlying operating systems and vulnerability scans are all steps to take to elevate visibility. The more awareness you have into what’s happening in your environment, the more calculated actions you can take to mitigate risk.

Load More
Popular Resources