Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by Neustar

Neustar Research shows large attacks growing as multi-vector exploits increasingly become the norm

In this report, Neustar, Inc., a trusted, neutral provider of real-time information services highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year.

White Paper | Presented by Neustar

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security and Pilfer Personal Data.

White Paper | Presented by Neustar

Neustar Named Market Leader for DDoS Prevention Solutions

Neustar SiteProtect NG offers 10+ Tbps of DDoS mitigation, the largest dedicated data scrubbing network in the world, so you can maintain your online presence.

White Paper | Presented by ConnectWise

Keep Cyber Threats from Destroying Your Company

Every company is a target, no matter its size, function or annual revenue. Security risks come from very direction - malware, social networks and even employees. Every company has information worth protecting, and you owe it to your users to keep every byte safe and secure.

White Paper | Presented by ThreatQuotient

Build or Buy? Answering the Eternal Technology Question

Threat intelligence platforms (TIPs) are at that inflection point and security teams are asking themselves, "Should we build or buy a TIP?" However, the better question to ask is, "Just because we could build one, should we?

White Paper | Presented by ThreatQuotient

The Buyer’s Guide to Threat Intelligence Platforms

Selecting the right threat intelligence platform is important as it will serve as the foundation for your entire threat operations programs, allowing you to understand and act upon the highest priority threats you face, while enabling you to get more from your existing resources - technology and people

White Paper | Presented by Veritas

IDG Access Paper: Why SDS is Essential for IT Transformation

This white paper, “Why SDS is Essential for IT Transformation,” helps you identify what to look for and what’s possible with SDS.

SOAR Like An Eagle: The Key to Fast & Full-Lifecycle Incident Response

Join Senior Principal Analyst and ESG Fellow, Jon Oltsik, and Director of Cyber Security at D3 Security, Stan Engelbrecht, CISSP, as they discuss the complexity of today’s security incidents and the need for organizations to utilize SOAR (Security Orchestration, Automation and Response) tools in order to seamlessly, and rapidly, coordinate the people, technology, and processes that make up their security infrastructure.

White Paper | Presented by BlackBerry

10 Reasons to Bring all your Endpoints Under One Roof

Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) are not equipped to manage the emerging Enterprise of Things (EoT), made up of all the IoT devices in today’s workplace. Find out why it’s time to secure all endpoints from a single console.

eBook | Presented by Flexera Software

A Framework to Strengthen Open Source Security and Compliance

Organizations have benefited greatly by the use of and investment in Open Source Software. Improved build times and better quality code has led to more than 50% of applications made up of open source software. The management of these Open Source assets is still nascent. To help legal, security and development teams and leaders identify their existing gaps and direct future investment, Flexera developed a maturity model framework based on an analysis of our customers and the market.

Load More