Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Maximize the ROI of Detection & Response

Advanced attackers can evade detection and stay under the radar by stealing credentials and masquerading as legitimate users. In response, security teams today must deploy multiple – often siloed – detection and response tools.

eBook | Presented by Palo Alto Networks

Elements of Security Operations

Elements of Security Operations dives into best practices on how to build a better SOC. Learn step by step how to make your security operations more effective, consistent and poised to tackle future threats.

How to pick a winner in EDR

As your enterprise faces more frequent targeted attacks, you need a more effective approach to detect malicious activity, inform your threat hunting and understand attacker behavior.

Threat Hunting 101

Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

Open and Dark Web Research: Tips and Techniques

Research Toolbox provides a rich set of capabilities allowing financial fraud investigators, cyber threat intelligence, and OSINT analysts to safely and anonymously research the web without negatively impacting the host or source network.

eBook | Presented by Lastline Inc

A Day in the Life of a SOC Analyst

The combination of Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) provides better security, but it’s still missing a key component to understand broad business context and how different devices and users interact in your environment.

A Practical Approach to Enterprise Identity Management

This document introduces a more balanced strategy for large-scale administration of identities and access rights.

Best Practices for Securing Privileged Access

This document reviews best practices for securing privileged access, including processes, policies and technology used to secure access to privileged accounts.

Complex IAM requirements in a University/Medical Center Environment

The presentation will describe how UCSF characterized and addressed challenges in replacing a system deeply entangled with core business processes, and expanding process automation to prepare UCSF for the future.

From Password Reset to Credential Management

This document describes this technological product evolution and highlights the product capabilities that organizations should demand from vendors, so that their investment will pay off in the long run.

Load More