Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Cylance

China - Creating Business Partnership and Preventing Cyber Attacks

China has emerged as an economic superpower over the past decade, with experts estimating its GDP will bypass that of the U.S. by 2029. With this hyper growth comes greater responsibilities in the global geo-political scene for balancing economic, military, and security concerns.

White Paper | Presented by Exabeam

CISOs Investigate: User Behavior Analytics

The value of peer input cannot be overstated. This independent report, authored by leading CISOs who have deployed or are looking to deploy a user behavior analytics (UBA) solution, offers real-world use cases and buyer guidance for IT security practitioners.

White Paper | Presented by Exabeam

Detect Next-Gen Threats with Modern Security Intelligence

Security management is broken. Despite spending billions on SIEM technologies, organizations continue to get breached. Read this white paper to learn how Exabeam addresses the weaknesses of SIEM.

White Paper | Presented by Exabeam

How to Detect Compromised User Credentials with User and Entity Behavior Analytics

IT system access is the link between employees and the systems that allow them to create business value. Attackers know that if they can impersonate one (or more) of them, they can steal the business value they create. Read this white paper and learn how to detect and investigate user impersonation quickly and effectively.

Virtual Event | Presented by Exabeam

Prevent Insider Threats with User and Entity Behavior Analytics

Malicious insiders are a common cause of data loss. Organizations must identify early patterns of risky behavior to prevent loss of sensitive data. Read this white paper and learn how User and Entity Behavior Analytics can be used to identify insider threats as well as common sources of insider threat signal data.

White Paper | Presented by Exabeam

The Anatomy of a Ransomware Attack

After infecting a victim's machine, Ransomware scours all accessible systems for valuable data to hold hostage in exchange for ransom. Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

White Paper | Presented by Exabeam

The Incident Response Makeover Guide

Incident response is a numbers game that rarely favors the defenders. The deluge of cyberattacks and sheer volume of alerts overwhelms security operations centers (SOCs) so thoroughly that security teams can barely keep up. To make over ineffective security analysis and incident response practices, organizations need to rethink their current playbook. Download the white paper and learn the ROI and operational benefits of a UEBA solution.

White Paper | Presented by Exabeam

The Incident Response Makeover Guide

Incident response is a numbers game that rarely favors the defenders. The deluge of cyberattacks and sheer volume of alerts overwhelms security operations centers (SOCs) so thoroughly that security teams can barely keep up. To make over ineffective security analysis and incident response practices, organizations need to rethink their current playbook. Download the white paper and learn the ROI and operational benefits of a UEBA solution.

The Impact of the Underground Economy, and How Analytics Can Fight It

The underground economy is thriving, thanks in part to new technologies and business models such as digital currencies and online marketplaces for freelance services. SAS fraud specialists reveal how government agencies can uncover these activities - and the tax obligations not reported from them.

How APIs are Transforming Large Enterprises

We've all seen the examples of how Netflix and others have transformed their entire business on the back of publishing APIs. You may not be Netflix, but there's no sign the API economy is slowing down. APIs are everywhere, from social and mobile apps to IoT, big data, and microservices.

Load More