Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Cybereason

The Forrester Wave™ Endpoint Detection & Response, Q1 2020 Report

With all the competing noise in the endpoint detection and response space, making the right security decision for your organization can be tough.

Video/Webcast | Presented by Cybereason

Sunburst On-Demand Attack Simulation

Get an interactive look at how attack campaigns operate today and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.

Video/Webcast | Presented by Cybereason

On-Demand Attack Simulation

In this special attack simulation, get an inside look at how multi-stage attack campaigns operate today. You will witness the attacker’s infiltration and watch the malicious operation as it moves across the entire environment.

White Paper | Presented by Cybereason

Ransomware Decoded

Though ransomware attacks dropped significantly in early 2018, over the past several years they have reemerged with a vengeance. Ransom payments have also shot up; in December 2019 the average ransom payout to an attacker was over $80,000.

Analyst Report | Presented by Cybereason

Highest Scoring Endpoint Protection

Not all endpoint protection platforms are the same, especially if you are in need of a solution that can help you protect your enterprise from the most advanced attacks, both known and unknown.

Sponsor Article | Presented by

AI and Computer Vision Create Safe Spaces

Learn how Sensing Feeling, a specialist in computer vision, adds value to the visual technology that a customer has already invested in by dramatically improving its performance with machine learning and AI.

Sponsor Article | Presented by

AI and Thermal Imaging Streamline Temperature Checks

Learn how the Heat Detection Camera, created by a partnership between Digital Barriers and Vodafone, gives end users or systems integrators a fully managed secure end-to-solution straightaway, rather than having to source the hardware and each capability from multiple vendors.

Sponsor Article | Presented by

Building Automation Offers Safer Workplaces

Learn how Intelligent control and IoT solution provider IAconnects Technology Ltd. expanded its IoT smart building platform to help companies adhere to health and safety requirements in real time.

Sponsor Article | Presented by

"Cloud in a Box” Puts Azure API Into an On-Site Appliance

Learn how the Dell EMC Integrated System for Microsoft Azure Stack Hub challenges the existing hybrid cloud model. By presenting neither a traditional CAPEX-heavy private cloud infrastructure play nor a network-dependent public cloud model, this is a different hybrid cloud option that gives the customer a new choice.

eBook | Presented by

Conversational Geek Office 365 Migration

Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email.

Load More
Popular Resources