Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How Data Breaches Affect the Enterprise (2020)

by Dark ReadingOct 26, 2020

Over the past 12 months, there's been more of everything on the data breach front — except good news. Additionally, thanks to COVID-19 and the sudden movement toward home workers, data breaches have become even more common in recent months. Download Dark Reading's report, How Data Breaches Affect the Enterprise, to uncover how enterprises are responding to damage from phishing, targeted campaigns, vulnerability exploits, and denial-of-service attacks. IT organizations have undergone


Network Detection and Response for MITRE ATT&CK Framework

by ExtraHopOct 28, 2020

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint


How a Platform Approach can Solve Today’s Security Conundrum

by CBTSOct 22, 2020

How a platform approach can solve today's security conundrum.

Cisco SecureX connects the breadth of an integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens security across your network, endpoints, cloud, and applications.

Learn the pros and cons of the 3 approaches to security platforms: Solution-based platforms. Technology-based platforms (SIEM and SOAR). Integrated,


Simplify Your Security

by CBTSOct 22, 2020

A new approach that redefines security.

An integrated security portfolio and infrastructure that enables a consistent experience—unifies visibility, drives automation, and strengthens security across your network, endpoints, cloud, and applications that empower security teams, processes, and technologies.

Cisco SecureX will: Unify visibility across your entire Cisco security infrastructure. Automate critical security workflows. Enable collaboration. Reduce complexity


Improve your business with a Virtual CISO

by CBTSOct 22, 2020

Is your organization in need of security strategy or direction?

Is your organization lacking a security strategy, having difficulty adopting best practices, or seeking direction on security initiatives and projects? A Virtual CISO brings needed experience and can act in an advisory role or help you with short-term or long-term projects. Qualified CISOs are difficult to find and expensive to employ. A Virtual CISO could be the answer you've been looking for.

Improve your


Managed Threat Detection and Response

by CBTSOct 22, 2020

What you don't know CAN hurt you.
Security is complex and challenging and few organizations have the experts or infrastructure to protect their data. Managed Threat Detection and Response helps organizations reduce time to detect and contain breaches, helping to protect critical assets and resources.

What do you need to know? Not all data is created equally. When moving to a cloud model, the dynamics change significantly. A strong combination of security tools and experts are


5 Questions Your Email Security Vendor Doesn't Want You to Ask

by AvananOct 21, 2020

Email gateways like Proofpoint and Mimecast were designed to protect on-prem email, but when you moved to the cloud, it revealed 5 vulnerabilities that expose users to attack.

Read "5 Questions Your Email Security Vendor Doesn't Want You to Ask" to learn:

• Why SEGs can't block insider email attacks
• Why SEGs allow attackers to bypass the gateway
• How impersonation attacks get through SEGs


The 2020 Microsoft Advanced Threat Protection Report

by AvananOct 21, 2020

In the most thorough analysis of its kind, Avanan analysts classified over 500,000 malicious emails, sent to real mailboxes protected by Microsoft's Advanced Threat Protection (ATP). This research identified the types of attacks that were blocked by ATP or EOP, and the types of attacks that were missed by both.

Read "The Microsoft ATP Report" to learn:
• Why ATP misses at least 18% of malicious emails
• How ATP works in different environments
• Why


Top Threats to Cloud Computing: The Egregious 11

by ExtraHopMay 01, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways


Guide To Microsoft Security

by BlumiraOct 08, 2020

To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity.

In this guide, you'll learn: How to use built-in Windows tools like System Monitor for advanced visibility into Windows server logs How to configure Group Policy Objects (GPOs) to give you a deeper look into your Windows environment Free, pre-configured tools from Blumira you can use to easily automate


SUBTOPICS:

Avanan

Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™, and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite, with a patented solution that goes far beyond any other Cloud Email Security Supplement.


Blumira

Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.


CBTS

With deep capabilities across security, data, network, voice, managed services, monitoring and management, CBTS covers your technology needs with end-to-end expertise and is dedicated to driving business outcomes.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo