Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

Don’t Change Your Network, Change Your Security

In this audio webcast you’ll learn how Zero Trust Auto-Segmentation from Edgewise gives you operational simplicity that’s unmatched and a security outcome that’s provable.

Video/Webcast | Presented by Sophos Inc

MegaCortex: the newest evolution of ransomware

Download this webcast with Peter Mackenzie, Malware Specialist at Sophos, to learn how MegaCortex works – and how to stop it.

White Paper | Presented by Carbon Black

Healthcare Cyber Heists in 2019

In healthcare, prevention often stands to be the best cure. This holds true for both physical and digital health. A person’s digital (and often physical) health can be directly tied to the cyber-security posture of their healthcare providers.

How to Use Security Ratings to Optimize Your Cybersecurity Program Performance

As organizations adapt to this change, it’s critical that they understand that their security program within a business context— as well as how to align it to both their business & risk appetite — and ultimately enabling the business to proactively mitigate risk across their organization.

White Paper | Presented by Sophos Inc

Securing the Public Cloud: Seven Best Practices

Spinning up new instances in Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) is simple. The hard part is keeping track of the data, workloads, and architecture changes in those environments and keeping everything secure.

White Paper | Presented by Sophos Inc

Stop Parasites on Your Network: Identify and block unwanted apps

Traditional app control is failing to do its job. Most modern firewalls are unable to see almost half of all network traffic, leaving parasitic apps to run unseen and unchecked. These apps steal resources, slow down legitimate activities and create security and compliance risks.

White Paper | Presented by Sophos Inc

Top 5 Reasons You Need EDR

This guide is essential reading for anyone thinking about endpoint detection and response (EDR).

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access?

Video/Webcast | Presented by Red Hat

Automating Security, Risk, and Compliance in the Financial Services Sector

Financial institutions are expected to address the ever-increasing number of security challenges and stringent security regulations, such as 23 NYCRR 500 , while also enabling innovative, differentiated experiences for their customers.

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network.

Load More