Filter the library by ...

video/webcast | Presented by Veeam Software

Before and After Ransomware: Preparedness and Recovery

Ransomware has become the main cybersecurity threat for enterprise organizations with damages in 2016 running over $1 billion. With an impressive ability to evolve, driven strongly through ransomware‑as‑a‑service platforms, the impact of an attack can be material for you and your business. Watch this informative webinar with cyber‑security expert Orlando Scott‑Cowley.

white paper | Presented by Kaspersky

Insider Threats: What Your Employees and Your Supply Chain Could Be Costing Your Business

Careless or uninformed employees contributed to 46% of security events. Download our eBook, Insider Threats: What Your Employees and Your Supply Chain Could Be Costing Your Business, to learn important tips to protect your employees and your data.

white paper | Presented by Sophos

A Coming Flood or a Distant Storm? The GDPR from a North American Perspective

The General Data Protection Regulation (GDPR) is a legislative framework valid across all the European Union (EU) states, replacing a patchwork of country-specific legislations. It is a law that is designed to strengthen the privacy and protect data for individuals across all the EU countries by requiring companies to adopt new data protection processes and controls.

white paper | Presented by Sophos

Firewall Best Practices to Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.

video/webcast | Presented by Sophos

Stop Unknown Threats with Intercept X

With 75% of malware unique to a single organization, you need to detect never-seen-before threats now. Download this on demand webcast to see how Intercept X leverages multiple advanced techniques, including deep learning, anti-ransomware and anti-exploit technology, to stop both known and unknown malware, dead.

white paper | Presented by Sophos

Testing Endpoint Security Guide

No organization can afford ineffective endpoint security that fails to provide protection against the broad spectrum of rapidly evolving real-world threats. In the interest of helping organizations to perform thorough measurements of the effectiveness of endpoint security products, we have put together this Testing Guide to provide guidance on what to look for in an endpoint protection solution.

video/webcast | Presented by Sophos

If You Can't See It You Can't Stop It - Network Firewalls' Dirty Little Secret

On average, 60% of Network traffic is unidentifiable by network firewalls*. Which means ransomware, advanced threats, and active adversaries are happily entering your network. Why? Because every firewall on the market uses application signatures to identify traffic passing through the firewall. In this webcast, we'll look at the top problems with firewalls today and what you should be looking for in your next firewall.

white paper | Presented by Relativity

Relativity Trust: Understanding Security in RelativityOne

Security is integral to who we are at Relativity-from our people and operations, to how we design RelativityOne and the foundation we build on in Microsoft Azure. Our commitment to make RelativityOne the most trusted and reliable cloud solution extends beyond ISO 27001 compliance. These are the tenets of Relativity Trust. Download this white paper for the details, from hiring practices to password policies to penetration tests.

white paper | Presented by Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy.

white paper | Presented by Bitsight

Take Control of Vendor Risk Management Through Continuous Monitoring

A study conducted by Forrester Consulting on behalf of BitSight shows why many firms may have a false sense of security with it comes to third-party cyber risk. See key findings and access your free copy here.

Load More