Top White Papers and Webcasts

  • On-demand Event Event Date: March 23, 2017 As you adopt the use of cloud services, whether in public/IaaS, SaaS or hybrid environments, the attack surface expands and, if breached, the costs increase exponentially. This session is designed to help IT and security leaders understand and address the unique challenges that enterprises typically face when they deploy their applications in the public cloud. It summarizes the areas that the public cloud vendors typically take care of and highlights the areas …

  • The ultimate goal of any attack on a computer system is to gain access to a target host and perform an unauthorized action, which results in the compromise of an asset or data. Intruders may use several techniques to circumvent these levels of protection, such as targeting vulnerable services, invoking backdoor privilege escalation, or replacing key operating system files. This research report details the capacity of an advanced endpoint protection (AEP) solution to detect, prevent, and continuously log …