Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

A New Take on Cloud Shared Responsibility

This SANS white paper will help you navigate cloud infrastructure nuances and strengthen your security posture. Learn the key components of a cloud-based detection and response model and understand the strengths and limitations of on-premises tools when applied to the cloud.? Download this ExtraHop-sponsored white paper to learn more.

Dark Reading Report: The State of IT Operations & Cybersecurity Operations

This new study from Dark Reading finds that while these two groups are getting better at collaborating, several key roadblocks continue to undermine their success. Ready to understand what those roadblocks are and how to overcome them?

Video/Webcast | Presented by Equalum

Dynamic Data Movement – Delivering Business Value in Real-Time

Join experts from Equalum and IDC as they explore how to evaluate the performance, scalability, and flexibility of a data integration solution; how to create an architecture for data enablement; and why implementing DataOps pays off.

Gartner: 2020 Hype Cycle for Security Operations

As organizations continue to adopt new IT—from mobile, cloud services, operational technology (OT), and the Internet of Things (IoT)—it’s clear that no single security technology provides complete protection, prevention, or visibility. Risk management leaders must make intelligent, business-driven decisions about which operations technologies they choose.

IDC Market Share: How the Network Is Used to Unmask the Adversary

The market for network intelligence threat analytics (NITA) is growing rapidly—it’s up 18.9% in 2019. As IDC’s Research Director for Security Products Chris Kissel indicates, the common denominator of tools and features NITA tracks to closely align with network detection and response (NDR).

Lessons Learned Investigating the SUNBURST Software Supply Chain Attack

In the wake of the SolarWinds attack, organizations worked around the clock to understand the full extent of the damage. As security teams went back through historical records, it became clear that most logs were limited or incomplete, which created an issue for narrowing the timeline.

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

Cybercrime tactics are becoming increasingly sophisticated, creating an urgent need for adaptable detection and defense plans. This whitepaper explores how security operations teams can implement the MITRE ATT&CK framework to help them defend against security threats.?

SANS Institute Survey: The State of Cloud Security

They found that, as most organizations are pursuing multi-cloud and hybrid environments, they’re also shifting away from a perimeter-based security approach. Learn what this means for cybersecurity toolsets and how new technology such as cloud-native network detection and response (NDR) enables a change of strategy. Download this ExtraHop-sponsored white paper to learn more.

SANS Review: Analyzing Malicious Behavior Effectively

Read the product review to find out what SANS says about Reveal(x), its ability to detect today’s advanced threats, and how it helps modern security teams solve common challenges.

ESG - 2020 Tape Landscape

ESG evaluates the ever-increasing need for data storage and determines that tape continues to be the most reliable, secure and cost-effective way to manage data storage.

Load More