Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

eBook | Presented by Lastline Inc

A Day in the Life of a SOC Analyst

The combination of Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) provides better security, but it’s still missing a key component to understand broad business context and how different devices and users interact in your environment.

A Practical Approach to Enterprise Identity Management

This document introduces a more balanced strategy for large-scale administration of identities and access rights.

Best Practices for Securing Privileged Access

This document reviews best practices for securing privileged access, including processes, policies and technology used to secure access to privileged accounts.

Complex IAM requirements in a University/Medical Center Environment

The presentation will describe how UCSF characterized and addressed challenges in replacing a system deeply entangled with core business processes, and expanding process automation to prepare UCSF for the future.

From Password Reset to Credential Management

This document describes this technological product evolution and highlights the product capabilities that organizations should demand from vendors, so that their investment will pay off in the long run.

Miscellaneous | Presented by eSentire

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Read the report to learn what attacks are targeting mid-sized organizations and the security strategies you need to safeguard your business

Video/Webcast | Presented by Lastline Inc

A Better Approach to Reduce False Positives

Even after implementing SOAR, SIEM, IDPS and other technologies to improve security insights, companies still spend thousands of hours triaging alerts that are mostly false positives.

White Paper | Presented by NowSecure

A Manager's Guide to the OWASP Mobile Security Project

This reference guide frames the challenge of securing an ever-growing mobile app portfolio with finite resources.

White Paper | Presented by Lastline Inc

False Positives: The Cure is Worse Than the Disease

This paper discusses the causes of the continued growth of false positives and the risky practices SOC teams employ to try to keep their head above water.

Geotechnical Contractor Eliminates Silos and Bolsters Security

A global geotechnical solutions provider was challenged by a complex, siloed IT environment that was hard to manage and secure. Find out how Insight helped them assess their situation, plan, and execute a deployment of multiple security solutions available within Microsoft 365.

Load More