Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy.

White Paper | Presented by Iron Mountain

Important Considerations Concerning SITAD In Rush to Cloud

Organizations wanting to follow best practices for regulatory compliance, governance & IT security may benefit from third-party expertise to help them complete the lifecycle of data & systems. For the before-and-after details surrounding cloud migration projects and ITAD, look for expert providers who can speak to all aspects of the data lifecycle - from ongoing data management to cloud data migration, cloud backup & final IT asset disposition.

Case Study Red Canary, Inc.

Red Canary's partnership with Farsight Security enables their threat investigation team to stop attacks before they result in breaches. Our Newly Observed Domains (NOD) solution recognizes the first time a domain is used. NOD serves as a primary and secondary indicator of potential threats based on endpoint behavior - regardless of the process that's making the network connection.

Chrome OS & Citrix: Simplify Endpoint Management and VDI Strategy

According to SIM IT Trends survey, 2017, Security/Cybersecurity/Privacy remains the second biggest business concern (only behind Alignment of IT and/with the Business) and the most worrisome personal concern of IT managers.

Chrome with XenApp Security Infographic

Learn how Chromebook and Citrix help protect your company data and reduce risk in this infographic.

White Paper | Presented by Citrix Systems

Citrix and Chromebook: The Most Secure End-To-End App Virtualization Solution

Businesses need to rethink their device strategy and how sensitive company information is made accessible and safeguarded. What's needed is a new era of devices designed for a mobile workforce, capable of securely accessing business-critical Windows® apps and data from anywhere across any network and any cloud without the inherent risks of laptops and unsecured consumer-oriented devices.

Cybersecurity Case Study ThreatConnect, Inc.

Using Farsight's Passive DNS database (DNSDB™), ThreatConnect, a Farsight Security Partner, exposed all of the attackers, those attackers' infrastructures, the attack timeline and new threat intelligence on the adversaries' objectives. Download this whitepaper to learn more.

DNSDB The Security Challenge

Transform threat feeds into Actionable, Relevant Threat Intelligence in Real-time. Farsight Security's passive DNS solutions allow today's corporate threat intelligence teams to better leverage their existing threat intelligence data by adding critical contextual information.

White Paper | Presented by Citrix Systems

Easily Deliver Secure, Cost-Effective Access to Windows® Apps on Chromebooks™ with Citrix XenApp®

Fast, simple access to Windows and line of business apps with Citrix XenApp, the industry-leading application virtualization solution, on Chromebooks. Together, Citrix and Google offer the best solution for enabling the mobile workstyle.

Farsight Security- Global DNS Defense Report

Every person and every organization, big or small, that uses the Internet uses DNS. In this research report, Farsight Security selected the primary domain for nearly 4000 organizations, including leading global corporations and higher education institutions. We then tested those domains using key DNS indicators to assess adoption of emerging technologies and risk exposure.

Load More