CSO Whitepapers


Sort by: Date | Company | Title


CrowdStrike Falcon Insight Endpoint detection and response
By CrowdStrike | 13/7/2017

STREAMING THE THREAT DETECTION AND RESPONSE LIFECYCLE WITH SPEED, AUTOMATION AND UNRIVALED VISIBILITY

Download this now


CrowdStrike Falcon Insight Endpoint detection and response
By CrowdStrike | 13/7/2017

STREAMING THE THREAT DETECTION AND RESPONSE LIFECYCLE WITH SPEED, AUTOMATION AND UNRIVALED VISIBILITY

Download this now


Vulnerability and threat intelligence feed for accurate prioritisation and fast migration
By Skybox Security | 10/7/2017

To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.

Download this now


Infographic: WannaCry and Threat-Centric Vulnerability Management
By Skybox Security | 10/7/2017

If the WannaCry ransomware attack taught us anything, it’s that traditional vulnerability management techniques aren’t protecting businesses from today’s threats. TCVM is a new approach, giving true visibility of an organisation’s risks. Use information from your network and current threats to prioritise vulnerabilities with precision. Take action immediately against your biggest threats, systematically reduce your attack surface and get more value from your team and technology.

Download this now


It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
By Skybox Security | 10/7/2017

Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.

Download this now


Enabling and Protecting the Open Enterprise
By CA Technologies | 29/5/2014

A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

Download this now


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014

Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.

Download this now


New Study Reveals Benefits from a Single Vendor, Multi-layered Solution
By Trend Micro Australia | 29/5/2014

In a new custom study commissioned by Trend Micro, Forrester Consulting surveyed over 1100 IT security decision makers from North American, European, and Asia Pacific companies with 100-5,000 employees.

The study identifies the benefits these IT professionals found from having a single-vendor, multi-layered solution. The benefits are:

- Reduced operational friction - Reduced cost - Better protection

Complete User Protection Trend Micro Complete User Protection is a multi-layer solution that provides your customers with the broadest range of interconnected threat and data protection across endpoints, email and collaboration, web, and mobile devices.

Download this now
[]