Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.
Threat hunting returns to the basic tenets of information security: reviewing your IT environment for signs of malicious activity and operational deficiencies. Download this whitepaper to answer the question, “Am I under attack?”View whitepaper
Need a crash course on SIEM? No problem.
Download this whitepaper now to learn everything you need to know from what SIEM is (and isn't) to how to get it up and running quickly and painlessly from security gurus.
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels, and strategic options.View whitepaper
Though organizations are in a foundational stage, digital workspaces have been proven to help enterprises overcome critical technology challenges and be the source of significant business value. Read this paper to learn more!View whitepaper
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud.View whitepaper
The risk of malicious activity has never been more of a reality for organizations.View whitepaper
Threat Hunting: Answering “Am I Under Attack?”
Threat hunting returns to the basic tenets of information security: reviewing your IT environment for signs of malicious activity and operational deficiencies. Download this whitepaper to answer the question, “Am I under attack?”
Building the Digital Workspace
Is there value in digital workplace strategies? Oxford Economics and Citrix surveyed 600 executives globally to answer this question. The findings will change your perspective.
5 Steps to Quantifying Insider Risk
A practical guide to assessing, detecting and preventing insider threats.
Transitioning from Managed Services to Managed Security
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase success. Download this whitepaper to find the current state of the market for MSSPs and the best practices for new MSSPs.
Ransomware: Four Ways to Protect Data Now
Hackers are targeting organizations with malware to encrypt crucial data, holding it hostage until payment is made. This white paper presents 4 ways to reduce exposure to ransomware, and recover data more quickly and effectively.
2017 Threat Hunting Survey Report
Organizations realize threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). Download this whitepaper to gain insight on the state of threat management in SOCs.
SC Media eBook on Encryption
With all the current talk about Apple, Safe Harbor and other encryption issues, this eBook will look at the state of encryption and how it has become as much a business issue as it is a security one.
SC Media eBook on Threat Intelligence
This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.
SC Media eBook on Ransomware
Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.
SC Media eBook on Internet of Things
IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.
SC Media eBook on Security Analytics
It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.
SC Media eBook on DDoS
Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.