Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

White Paper | Presented by Carbon Black

Application Control Observations & Strategies for Success

It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to organizational security, such as application control, to ensure the fidelity and security of intellectual property.

Miscellaneous | Presented by Carbon Black

How to Successfully Deploy Application Control

Application control remains one of the best techniques for blocking the vast majority of malware threats; however, implementation often falters due to poor planning. Security and risk management leaders must consider these best practices for successful application control projects.

White Paper | Presented by Carbon Black

7 Experts on Moving to a Cloud-Based Endpoint Security Platform

Without a doubt, endpoint security has become an urgent priority for many organizations, and it’s not hard to see why. Industry research by IDC is showing that 70 percent of successful breaches enter through an endpoint. Other research shows that more than half of companies have been hit with successful attacks, and more than three-quarters of those attacks were fileless. For many companies, the modern business environment has become a mobile workplace in which employees work from wherever they happen to be. The fact that people continue to be the weakest security link has made mobile PCs and extended networks a sweet spot for attackers. So how are companies responding? Many are moving to cloud-based, next generation, Endpoint Security platforms.

White Paper | Presented by Carbon Black

Moving Endpoint Security to the Predictive Cloud

Traditional antivirus (AV) vendors aren’t keeping up with today’s threats. They don’t protect against unknown attacks until it’s too late, forcing security teams to scramble for new products every time a new wave of attacks hits. This reactive approach has resulted in too many tools on the endpoint that don’t work together —stretching security professionals to their breaking point.

White Paper | Presented by Carbon Black

SANS Evaluators Guide to Cloud-Based NGAV

Legacy antivirus does not stop the malware and non-malware attacks companies face every day, so customers are looking for next-generation antivirus (NGAV) products that will. Yet with all these new technologies, many are confused about what they should be looking for.