Whitepapers


Sort by: Date | Company | Title


Power to the People: GDPR, Trust, and Data Privacy
By ForgeRock | 1/12/2017

Trust conquers all. As a result of the digital transformation revolution, consumers are sharing more information than ever. And regulatory bodies are taking a closer look at how organisations are treating this data.

Download this now


The Future of Privacy in the IoT Era
By ForgeRock | 1/12/2017

From Data Protection to Consent and User Control.

Download this now


ForgeRock Company Overview
By ForgeRock | 1/12/2017

A quick snapshot of ForgeRock.

Download this now


GEICO Selects ForgeRock® to Support Online Customer Portal Initiative
By ForgeRock | 1/12/2017

Major US auto insurer leverages ForgeRock Identity Platform™ to create secure online experience

Download this now


Checklist: How to stop Ransomware
By Sophos | 22/11/2017

Ransomware attacks start in two main ways. A booby-trapped email with a malicious attachment or via a compromised website; which then work their way down to your endpoints and servers. To stop these attacks, it’s critical that you have advanced protection technology in place at each stage of the attack and combine this protection with good user security practices.

Download this now


The Global CIO Point of View
By ServiceNow | 22/11/2017

The New Agenda for Transformative Leadership: Reimagine Business for Machine Learning

Download this now


Streamlining Security Incident and Vulnerability Response
By ServiceNow | 22/11/2017

Security incident identification and remediation are daunting challenges for security teams. Manual processes, multiple cross-team hand-offs, and the proliferation of security tools hinder a team’s ability to quickly assess and remediate vulnerabilities and attacks.

Download this now


State of Endpoint 2017
By CrowdStrike | 15/11/2017

​A recent study from the Enterprise Strategy Group (ESG) “Trends in Endpoint Security” study shows that security teams want more effective, more efficient cloud based solutions. With the endpoint being the target of most cyber attacks, endpoint security is rising in prominence. However according to the report, there is a complete lack of confidence in current AV solutions meaning that organisations are adding bolt-on technology for better protection, which in turn creates endpoint bloat and less efficiency.​

Download this now


The Five Essential Elements of Next-Generation Endpoint Protection
By CrowdStrike | 15/11/2017

​The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. Claims can range from behavioral detection to some degree of machine learning or cloud-based protection. However, closer inspection reveals that these new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release