Security Whitepapers


Sort by: Date | Company | Title


IDC MarketScape: Worldwide Endpoint Specialised Threat Analysis and Protection 2017 Vendor Assessment
By Carbon Black | 18/9/2017

This IDC study focusing on Carbon Black and uses the IDC MarketScape model to provide an assessment of providers participating in the endpoint specialised threat analysis and protection market.

Download this now


The Forrester Wave: Endpoint Security Suites, Q4 2016
By Carbon Black | 18/9/2017

In this evaluation of endpoint security suite providers, we identified the 15 most significant ones and researched, analysed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.

Download this now


Out with the Old, In with the New: Replacing Traditional Antivirus
By Carbon Black | 18/9/2017

A SANS Guide to Evaluating Next-Generation Antivirus.

Download this now


Electronic Signature Guide for Banks
By eSign by Vasco | 12/9/2017

Today, your customers want service quickly, at their convenience. Customers need to be able to do everyday banking, open accounts, sign loans and more, from anywhere, at any time, on any device. They are seeking the omni-channel experience, with the flexibility to start a transaction in one channel and complete it in another. As a result, the traditional way of signing forms and documents is changing – from paper to paperless. Read more here

Download this now


Guide to Electronic Signatures
By eSign by Vasco | 12/9/2017

The trend to digitise and transform business is accelerating. Government and business leaders, analysts and industry associations agree: it is time to remove paper from everyday processes like contracting, HR, invoicing and transactions with customers and citizens. As a result, the traditional way of signing documents is changing – from paper to paperless.

Download this now


The Security Challenge for SMBs in a Mobile World
By Microsoft | 7/9/2017

There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognising the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.

In this paper, we’ll consider why blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. We’ll also outline some key considerations when investing in new mobile devices, so your business gets the full benefits of the latest trends in IT. Plus, we’ll explore some typical workplace scenarios to show how this results in practical benefits for your people and your business.

Download this now


8 Things CIOs Need to know about Whaling
By Mimecast | 16/6/2017

Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks.

Download this now


The Threat Lifecycle Management Framework
By LogRhythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


Status Quo Creates Security Risk: The State of Incident Response
By ServiceNow | 22/3/2017

This research project was undertaken in order to evaluate the current practices and challenges associated with incident response processes and technologies. Respondents were also asked to provide details on their organisations’ future strategic plans intended for improving the efficacy and efficiency of IR activities.

Download this now

Market Place