eBooks


This page shows a subsection of our research library, filtered by papers in the eBook category.

Cover image for Overcoming the complexity gap - the role of automation in optimising network performance and security

Overcoming the complexity gap - the role of automation in optimising network performance and security
By:

This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...

Cover image for Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
By:

The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain

Cover image for Uniface: A low-code development disruptor - a modern visual development platform with provenance

Uniface: A low-code development disruptor - a modern visual development platform with provenance
By:

Uniface is a different kind of disruptor on the increasingly popular low-code development platform space.

Cover image for The importance of a data protection platform for GDPR compliance - ...unified data protection controls will smooth the path to compliance

The importance of a data protection platform for GDPR compliance - ...unified data protection controls will smooth the path to compliance
By:

This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.

Cover image for The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services

The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
By:

Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.

Cover image for How to raise your organisation's security maturity level - the need for Security Intelligence and why it should be a board-level concern

How to raise your organisation's security maturity level - the need for Security Intelligence and why it should be a board-level concern
By:

This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.

Cover image for Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation

Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
By:

This document describes what options are available for disrupting attackers at each stage of the kill chain.

Cover image for AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations

AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations
By:

Organisations will benefit from a unified, coordinated security monitoring capability encompassing many controls and traversing the entire network in a simplified manner.

Cover image for Practices for Enhancing Data Security - a survey of organisations in the UK and the US

Practices for Enhancing Data Security - a survey of organisations in the UK and the US
By:

This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.

Cover image for IBM: enhanced 360° view

IBM: enhanced 360° view
By:

This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed

Cover image for Security intelligence: solving the puzzle for actionable insight

Security intelligence: solving the puzzle for actionable insight
By:

The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent

Cover image for The need to protect against file-based attacks - statistical evidence for the need for greater assurance

The need to protect against file-based attacks - statistical evidence for the need for greater assurance
By:

The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.

Cover image for Technology evolution & its impact on security - why the endpoint must be the new focus

Technology evolution & its impact on security - why the endpoint must be the new focus
By:

Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.