Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by ReliaQuest

451 Research Report: Tackling the Visibility Gap in Information Security

451 Research recently published insights gathered from in-depth interviews with security leaders across 150 large enterprises to better understand the most critical challenges facing their teams.

White Paper | Presented by ReliaQuest

5 Approaches to a Consistently Evolving Security Program

The difficulty and expense of IT security can place a heavy burden on enterprises and their security teams. But when executed correctly, a consistently evolving security program can help manage costs and drive value beyond cybersecurity by delivering key strategic data analysis and insights to other departments.

White Paper | Presented by ReliaQuest

Application Logging Challenges in Information Security

Logging events from applications is an important process in cybersecurity. Whether it’s a custom-built application, or one hosted by a third-party company, logging and monitoring these applications is necessary to get full visibility into your environment. This type of logging doesn’t come without its share of challenges.

White Paper | Presented by ReliaQuest

Information Security Program Health Monitoring Guide

Building preventive processes that minimize disruption and support tool efficacy. Security program health monitoring is an often-overlooked process that’s critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.

White Paper | Presented by ReliaQuest

Overly Managed Security: Rethinking the Problem

Over the past ten years, the cybersecurity market has exploded with tools, technologies, platforms, and service providers, who got into the business of security for the same reason most people get into any business: to help solve a problem.

White Paper | Presented by ReliaQuest

The Log Parsing Challenge

Getting ahead of security threats and business trends can set enterprise organizations apart from their competition and enhance customer service.

White Paper | Presented by ReliaQuest

Three Steps to Securing Enterprise Data on Cloud Platforms

Assuming security of data stored on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) is dangerous and potentially costly. The truth is, these cloud platforms offer excellent security options, but require proper configuration and monitoring to ensure consistent security.

White Paper | Presented by ReliaQuest

Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

The key to minimizing security threats and maximizing business insights is logging and monitoring all relevant events from across and enterprise IT environment — but some data sources present unique logging challenges, often leaving them unmonitored and vulnerable to attack.

White Paper | Presented by ReliaQuest

Overly Managed Security

Over the past ten years, the cybersecurity market has exploded with tools, technologies, platforms, and service providers, who got into the business of security for the same reason most people get into any business: to help solve a problem.

White Paper | Presented by ReliaQuest

3 Steps to Securing Enterprise Data on Cloud Platforms

Many of today’s security teams are seeking guidance on how to manage security on cloud platforms platforms. The secret to success starts with understanding the common platform risks inherent in cloud technologies. Form threat protection to GDPR compliance, security teams have a lot to consider when configuring their environment for a cloud platform.

Load More