Filter the library by ...

white paper | Presented by Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy.

white paper | Presented by Bitsight

Take Control of Vendor Risk Management Through Continuous Monitoring

A study conducted by Forrester Consulting on behalf of BitSight shows why many firms may have a false sense of security with it comes to third-party cyber risk. See key findings and access your free copy here.

white paper | Presented by Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program.

white paper | Presented by Jamf

Modern Device Management: Mac Alongside Windows

The rise of employee-choice programs, and the resulting growth of Apple in the enterprise, introduces new challenges and unknowns for previously Windows - dominated environments. This report outlines how Mac and Windows devices, tools and infrastructure can be integrated to deliver a more secure and productive environment.

white paper | Presented by Jamf

Security Considerations for Apple in the Enterprise

This white paper addresses common security discussions and explains what organizations need to know about the Apple platform, so that internal teams are well educated about security best practices before bringing Apple devices into their environment.

video/webcast | Presented by GoToAssist

Ensuring Security for Technical Support

In today's digital enterprise, ensuring security in the support process is more important that ever: the number of cyber-attacks designed around fake support sessions continues to grow. The good news is that new support platforms are available that provide greater protection. Join us as we discuss how these solutions solve the challenge for both users and support professionals.

white paper | Presented by Arbor Networks

2017 Global DDoS Mitigation Products Market Leadership Award

Arbor Networks has established itself firmly as the DDoS mitigation products market leader by delivering a robust and integrated portfolio of products, services, and features. Furthermore, the company's attention to customer value and a clear strategy to mitigate future attacks indicates the company's staying power as the leading provider of DDoS mitigation products.

ebook | Presented by Arbor Networks

Insight Into The Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report

This document highlights key industry trends and threats facing network operators, along with the strategies used to mitigate them.

white paper | Presented by Arbor Networks

SWOT Assessment: Arbor Cloud

Arbor Cloud combines carrier-grade mitigation equipment with network bandwidth expanding to 8Gbps by 1Q18 to address huge volumetric attacks. It also comes with the threat intelligence provided by Arbor's Active Threat Level Analysis System (ATLAS), collected from its 300+ carrier partners, and the expertise of the Arbor Security Engineering and Response Team (ASERT) of researchers.

white paper | Presented by Neo4j

The Top 5 Use Cases of Graph Databases

Graph databases enable you to generate competitive insights and derive significant business value from your connected data. Discover the top five most impactful and profitable use cases of graph databases, including fraud detection, real-time recommendations, and master data management.

Load More