Security Whitepapers


Sort by: Date | Company | Title


The Threat Lifecycle Management Framework
By LogRythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


Status Quo Creates Security Risk: The State of Incident Response
By ServiceNow | 22/3/2017

This research project was undertaken in order to evaluate the current practices and challenges associated with incident response processes and technologies. Respondents were also asked to provide details on their organisations’ future strategic plans intended for improving the efficacy and efficiency of IR activities.

Download this now


A Practical Guide to Efficient Security Response
By ServiceNow | 22/3/2017

Data breaches constantly threaten the modern enterprise. And the risk continues to grow: In 2015, the total number of identities exposed via data breaches increased 23%, to 429 million. Time-to-compromise is now measured in minutes, and data exfiltration happens in days.

Worse still, detecting a breach can take months, with a median of 201 days to discovery. Unable to quickly respond, organisations risk exposing valuable data and confidential information. The recovery process can be incredibly expensive and the damage to the business reputation incalculable.

Download this now


5 Key Considerations for Effective Security in a Mobile World
By Dilignet | 16/3/2017

The way in which people work has changed. The mobile workforce is a reality. Yet while new ways of working bring many benefits, they demand a new approach to security.

For instance, how do you secure your data and applications on the internet? What happens if a device gets stolen? How do you ensure documents are secure if they are used in public environments? Can you provide quality technical support to users who are working from home? How will your employees ensure that their work and private information remains separate?

Read this whitepaper to find out more.

Download this now


RSA SECURID® SUITE: Accelerate Business While Mitigating Identity Risk
By RSA | 1/3/2017

Introducing the RSA SecurID® Suite, the only identity and access assurance solution that meets the dynamic access needs of today’s modern workforce.

The RSA SecurID Suite offers a comprehensive set of capabilities including access management, authentication, risk analytics, identity governance and life-cycle management.

The RSA SecurID Suite helps solve two fundamental challenges for your organisation. Are my users who they say they are, and do they have the right level of access?

Download this now


Reimagine Your Identity Strategy
By RSA | 1/3/2017

What if imagination and creativity flowed as freely in your business? Unhindered by fear or insecurity, you’d have the courage, ambition and hope to reach new users, deploy new technologies and grow your business faster. You could conquer the world (or at least the marketplace).

Your identity strategy should be the wings that keep your business—and your users—soaring.

Reimagine your identity strategy with the RSA SecurID® Suite, the industry’s most advanced identity and access assurance solution that helps minimise risk and accelerate business. With the RSA SecurID Suite, you’re free to explore a world of limitless possibility.

Download this now


A New Paradigm For Identity Assurance
By RSA | 1/3/2017

The criminals, hacktivists, and others trying to breach corporate cybersecurity are just like anyone else: they want to accomplish their mission as efficiently as possible. So why focus on compromising an organisation's access device or infrastructure? That’s not where the action is.

Advanced threats today target what is on either side of those systems: the user sitting at the keyboard, and the corporate data he or she has access to as part of the job. The goal for the attacker is to compromise identities, impersonate legitimate users to glide past security controls, find valuable data, and glide back out undetected.

Read this whitepaper to find out more.

Download this now


Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It
By Radware | 2/12/2016

"Pay Up or Else." It has become the modus operandi for a new generation of financially motivated cyber assailants. These hackers are leveraging new "pay-for-play" attack tools and services that are available via the Darknet, making ransom cyber-attacks available to even the most novice hackers.

Download Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It, to understand:

• The current threat environment and why ransom attacks are increasing in popularity

• How to differentiate between the real and fake ransom attacks

• Attack tools and services now available to hackers via the Darknet

• The most likely targets of ransom attacks and how to prepare

Download this now


Top 5 Steps to Reduce File Data Leakage Risks
By FinalCode | 26/9/2016

Given the necessity of file sharing, respective risks and obligations, and available file protection mechanisms, what is a pragmatic approach for organizations to reduce IP loss, privacy compliance liability and business exposure due to sensitive file data leakage. Here are the top 5 steps that your organization can put in place today.

Download this now

Market Place