Tech Library White Papers

See our Free Webcasts.

Free White Papers Sponsor Index

  • Addressing the Top 10 Security Issues Organizations Face

    Cybersecurity must be a top-level priority for any organization and for many it is. Security should be viewed holistically and should include a range of elements, including layered, technology-based solutions on-premises and in the cloud; security awareness training to help employees become a more integral part of security defenses; the establishment of common-sense policies and practices that will bolster security defenses; and security education for the board of directors and senior managers to help them understand the critical role they play in enabling a culture of security.

  • What Keeps You Up at Night

    In this report, we’re going to take a deep dive into the stuff of nightmares - security concerns that have organizations worried.

  • 12+ Ways to Hack Two-Factor Authentication

    All two-factor authentication (2FA) mechanisms can be compromised, and in some cases, it's as simple as sending a traditional phishing email. Want to know how to defend against 2FA hacks? This white paper covers over a dozen different ways to hack various types of 2FA and how to defend against those attacks.

  • Disaster Recovery: Make the Case to Add it to Your IT Budget

    Business leaders may think Disaster Recovery isn’t worth the cost in their budget. Yet human error, cybercrime or a natural disaster can cause company’s digital infrastructure to come crashing down in seconds. Then what?

  • Unified Security Management vs. SIEM: a Technical Comparison

    Get a full overview of the changing security landscape, and more importantly insight into the rapidly changing SIEM category, and the reasons that have led to those changes.

  • Best Practices for Office 365 Security Monitoring

    In this white paper, you'll learn about security monitoring best practices for Office 365.

  • Top 10 PCI DSS Compliance Pitfalls and How to Avoid Them

    In this white paper, we’ll walk through the most common PCI DSS pitfalls, and what you can do to avoid them.

  • 6 Steps SIEM Success

    Whether you are looking at SIEM for threat management or compliance, we’ve put together the following evaluation guide to help you find the best SIEM solution for your organization.

  • Beginner’s Guide to Open Source Intrusion Detection Tools

    Discover the Various Open Source IDS Tools Available to You. This white paper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.

  • Beginner’s Guide to AWS Security Monitoring

    As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year’s report. This report will examine a number of these concerns in detail, and specifically address how to avoid making costly mistakes that can leave data exposed.

  • Insider’s Guide to Incident response

    The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape.

  • Beginners Guide to SIEM

    Need a crash course on SIEM? No problem. Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.

  • How to Build a Security Operations Center (on a Budget)

    In this eBook you'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

  • Open Source Network Security Tools for Beginners

    In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

  • eGuide: Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure

    As the virtual hybrid infrastructure has evolved, technologies and tactics for backup and recovery have evolved as well. Backup and recovery functions have changed significantly with the advent of virtualization and cloud-based environments. Read this paper to learn about technology that can help you expedite the recovery process.