Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    White Papers // Sep 2017 // provided by McAfee, Inc.

    The UEBA specialty has evolved quickly, starting with users and now encompassing entities. As the core of an open ecosystem, McAfee Enterprise Security Manager integrates with multiple UEBA products, providing proven integrations you can leverage instead of creating ad-hoc one-off connections. This helps simplify security investigations ...

    Read More
  • Smart paper: IBM Cognos Analytics: The next wave of BI for the data-driven enterprise

    White Papers // Aug 2017 // provided by IBM

    IBM believes that effective business intelligence (BI) is a state of being, not a single action. It entails quickly developing data-driven insights and immediately delivering those insights to the right people. This means that BI tools aren’t the entire solution; they’re simply a key part of a business environment ...

    Download Now
  • The Carbon Black 2016 Threat Report

    White Papers // Aug 2017 // provided by Carbon Black

    According to Carbon Black data, attackers are holding data for ransom at an alarming rate and are continuing to deploy attacks across every industry. In conjunction with the rise of ransomware and the continued ubiquity of mass malware, attackers are increasingly utilizing non-malware attacks in an attempt to remain undetected ...

    Find Out More
  • Application Control for Dummies

    White Papers // Aug 2017 // provided by Carbon Black

    Application control, sometimes called application whitelisting, is a means for controlling the software applications that can be run on a given computer or device. Application control flips the security paradigm of blacklisting on its head. Rather than trying to prevent bad software from running, application control allows only good software ...

    Read More
  • Comparison Guide: Finding a Password Manager for Your Business

    White Papers // Aug 2017 // provided by LastPass

    Solving the password security disconnect between IT and employees demands the right solution. From external threats to managing Shadow IT, protecting your company, employees, and customers is a complex job. Staying on top of all possible threats can be overwhelming. What you need is a solution that gives you the ...

    Read More
  • Future Privilege Management

    Videos // Aug 2017 // provided by One Identity

    The realm of privileged account management (PAM) is expanding horizontally and vertically. It’s expanding horizontally by covering more than just the administration of passwords and login, as well as by providing full support for managing privileged sessions at runtime; and it’s expanding vertically by focusing on far more than a ...

    Watch Now
  • SSL Best Practices: Domain Protection

    Webcasts // Aug 2017 // provided by Entrust Datacard

    Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks ...

    Watch Now
  • 5 Ways Security Impacts Website Engagement

    Webcasts // Aug 2017 // provided by Entrust Datacard

    Join cyber security leader SiteLock as they share insider tips on securing your website and web application that you can implement in your business right away. In this webinar, you will learn: How to avoid Internet blacklisting The latest technology used against malware ...

    Watch Now
  • Security for Future Ready Workforce

    White Papers // Aug 2017 // provided by Dell

    Today, technology is all about enabling the end users. Organizations of many types and sizes are developing, upgrading or replacing mobile applications to reflect changes in the workplace. Across industries, employees are working more while mobile, using multiple devices. When they return to the office, they are capitalizing on more ...

    Download Now
  • The Perimeter: An Identity Crisis

    White Papers // Aug 2017 // provided by F5

    Sixty-three percent of data breaches involve weak, default, or stolen passwords and ninety percent of today's security budgets are still spent on protecting everything but user identities and applications. This report highlights the key challenges of managing a complete identity and access solution during a time when cloud applications and ...

    Download Now