White Papers & Webcasts Archive
White Papers & Webcasts
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they
Read More
White Papers & Webcasts
Research by third-party analyst Aberdeen Group reveals the true cost of “Free” endpoint security solutions.
Read More
White Papers & Webcasts
As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the existence of
Read More
White Papers & Webcasts
This research was conducted to understand the cost and consequences of these security threats. Ponemon Institute surveyed 641 individuals involved in preventing, detecting, and containing denial-of-service attacks against
Read More
White Papers & Webcasts
This research was conducted to understand how organizations are protecting web applications, and how web application attacks affect both an organization’s security posture and bottom line. Ponemon Institute
Read More
White Papers & Webcasts
In Forrester’s 36-criteria evaluation of distributed denial of service providers, nine of the most significant companies were identified in a crowded field of competitors. These companies were researched,
Read More
White Papers & Webcasts
Talking about the threat landscape is no substitute for experiencing it first-hand. “M-Trends 2015: A View from the Front Lines,” distills the insights gleaned from hundreds of Mandiant
Read More
White Papers & Webcasts
You understand the intricacies of today’s threat landscape, and the difficulties your organization faces when attempting to prevent, investigate and remediate targeted attacks, but how do you explain
Read More
White Papers & Webcasts
The FireEye Advanced Threat Report for EMEA provides an overview of the advanced persistent threats (APT) targeting computer networks that were discovered by FireEye during the first half
Read More
White Papers & Webcasts
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In this follow-up to our groundbreaking May 2014 report,
Read More