Filter the library by ...

white paper | Presented by Kaspersky

Insider Threats: What Your Employees and Your Supply Chain Could Be Costing Your Business

Careless or uninformed employees contributed to 46% of security events. Download our eBook, Insider Threats: What Your Employees and Your Supply Chain Could Be Costing Your Business, to learn important tips to protect your employees and your data.

white paper | Presented by Sophos

A Coming Flood or a Distant Storm? The GDPR from a North American Perspective

The General Data Protection Regulation (GDPR) is a legislative framework valid across all the European Union (EU) states, replacing a patchwork of country-specific legislations. It is a law that is designed to strengthen the privacy and protect data for individuals across all the EU countries by requiring companies to adopt new data protection processes and controls.

white paper | Presented by Sophos

Firewall Best Practices to Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.

video/webcast | Presented by Sophos

Stop Unknown Threats with Intercept X

With 75% of malware unique to a single organization, you need to detect never-seen-before threats now. Download this on demand webcast to see how Intercept X leverages multiple advanced techniques, including deep learning, anti-ransomware and anti-exploit technology, to stop both known and unknown malware, dead.

white paper | Presented by Sophos

Testing Endpoint Security Guide

No organization can afford ineffective endpoint security that fails to provide protection against the broad spectrum of rapidly evolving real-world threats. In the interest of helping organizations to perform thorough measurements of the effectiveness of endpoint security products, we have put together this Testing Guide to provide guidance on what to look for in an endpoint protection solution.