Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by FireEye

The SIEM That Cried Wolf

When security teams are only able to investigate 29% of malware alerts, how are you ensuring your SIEM is prioritizing the most important ones?

White Paper | Presented by IBM

IBM Enterprise Video Streaming and Webex Meetings

Download this whitepaper to discover how IBM Enterprise Video Streaming and Webex Meetings leverage AI to enhance how users interact with recorded sessions.

White Paper | Presented by FireEye

Taking Control of Security Operations

In this white paper, Taking Control of Security Operations, you will: - Learn how to improve visibility and make sense of your alert volume - Discover how to understand and anticipate attacker behavior - Find out how to integrate and automate your products and processes

White Paper | Presented by Expanse

YOUR NEW ATTACK SURFACE: Discover, Track, and Manage the Assets That Attackers Target

Download our latest white paper, Your New Attack Surface, to learn, why the Internet attack surface is the most critical part of your Internet presence to focus on, the most common causes of cyber breaches and how to prevent them, as well as valuable strategies on how to reduce your overall risk profile.

White Paper | Presented by Expanse

DISCOVER AND MONITOR YOUR INTERNET ASSETS

In this brief you will learn why you need a single source of truth for Internet-connected assets on-prem and in the cloud, how IT operations and security teams benefit from Expanse, as well as how you can reduce third-party risk with Expanse.

White Paper | Presented by Expanse

5 COMMON PERIMETER EXPOSURES AND WHAT YOU CAN DO ABOUT THEM

Download this white paper to learn the five most common exposures and proactive steps you can take to protect your network.

White Paper | Presented by Carbon Black

Cognitions of a Cybercriminal

Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior.Attackers are getting better at moving around inside systems without being detected.

White Paper | Presented by VeloCloud

7 Questions to Ask when Evaluating SD-WAN

The goal of this white paper is to cut through the confusion in the market by identifying seven key questions that network organizations should ask themselves as part of evaluating SD-WAN solutions to ensure they are addressing the needs of their business today and identifying solutions which are future-proofed for both known and unforeseen needs over several years.

White Paper | Presented by VeloCloud

Demonstrating SD-WAN Business Value; Rethinking WAN for a Modern Age 

In this white paper by ESG, we take a look at changes in the network consumption model, introduction of complexity, and WAN requirements. We then take a look at two real-world case studies of total cost of ownership and ROI and the methods used to achieve these results with SD-WAN.

White Paper | Presented by VeloCloud

Go Mainstream with SD-WAN: Migration Best Practices

Over the last couple of years, SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management.

Load More