Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

White Paper | Presented by Carbon Black

Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

According to the world’s top incident response professionals, politically motivated cyberattacks from nation-state actors are on the rise: causing system outages and destroying data in ways designed to paralyze an organization’s operations.

White Paper | Presented by Carbon Black

Essential Requirements for Cloud-Based Endpoint Security

Endpoint protection began in the late 1980s with the introduction of the traditional antivirus (AV) that continues today as the first line of defense against known malware. But with the growth of cloud computing and mobile devices, the network perimeter has truly moved to the endpoint, and with that move comes the need for new techniques and tools that can counter threats before they take root.

White Paper | Presented by Carbon Black

Replace AV Buyers Guide

You want security that works and is easy to implement and manage, but you’re working with a limited budget and resources. Many organizations know their current antivirus solution has gaps, but don’t know where to begin in the search for something new. According to ESG Research, 65% of organizations believe that the skill level of their security team could use improvement and 48% are using more than 25 security products. This leads to more overworked people and, ultimately, less effective security.

White Paper | Presented by Carbon Black

7 Experts on Moving to a Cloud-Based Endpoint Security Platform

Without a doubt, endpoint security has become an urgent priority for many organizations, and it’s not hard to see why. Industry research by IDC is showing that 70 percent of successful breaches enter through an endpoint. Other research shows that more than half of companies have been hit with successful attacks, and more than three-quarters of those attacks were fileless. For many companies, the modern business environment has become a mobile workplace in which employees work from wherever they happen to be. The fact that people continue to be the weakest security link has made mobile PCs and extended networks a sweet spot for attackers. So how are companies responding? Many are moving to cloud-based, next generation, Endpoint Security platforms.

White Paper | Presented by Carbon Black

Moving Endpoint Security to the Predictive Cloud

Traditional antivirus (AV) vendors aren’t keeping up with today’s threats. They don’t protect against unknown attacks until it’s too late, forcing security teams to scramble for new products every time a new wave of attacks hits. This reactive approach has resulted in too many tools on the endpoint that don’t work together —stretching security professionals to their breaking point.

White Paper | Presented by Carbon Black

SANS Evaluators Guide to Cloud-Based NGAV

Legacy antivirus does not stop the malware and non-malware attacks companies face every day, so customers are looking for next-generation antivirus (NGAV) products that will. Yet with all these new technologies, many are confused about what they should be looking for.