T.E.N. Knowledge Base

ISE® Northeast 2020

WATCH "Deep Dive Demo Presented by Qualys’ Chief Product Officer & President"  > View Demo Video
Qualys readies its next-gen vulnerability management offering  > Download Whitepaper
Qualys is launching Vulnerability Management, Detection and Response (VMDR), an upgrade to its widely used vulnerability management service that is designed to incorporate an expanded set of requirements.



Going Mobile Increases Risk  > Download Whitepaper
Now more than ever, organizations are using mobile devices to compete in an agile, evolving market and keep their employees connected. For the first time, more than half of all devices connected to the Internet are mobile.1 At the same time, mobile malware is more prevalent than ever, with attacks rising 50% in the last year alone.2 While the focus of enterprise security solutions has historically been on desktop devices, more businesses are discovering the growing threat of malware phishing attacks aimed at mobile devices, especially within applications.



2020 DATA EXPOSURE REPORT ON INSIDER THREAT  > Download Whitepaper
Today’s corporate race for ideas has given way to a new collaboration era. We are living in a time when data is being created and shared every second of every day from everywhere. Powered by the latest technologies, employees are emailing, airdropping, messaging and slacking 24/7 from laptops, mobile devices, at customer sites and in coffee shops. And while these hallmarks of the modern workforce yield critical innovation, they’re also a breeding ground for dangerous data security risks — more specifically insider threats.



BRINGING REMOTE WORKFORCE RISKS INTO CLEAR FOCUS  > Download Whitepaper
As businesses in every sector shift agility and business continuity to the top of their priority list, security teams are being forced to accept the added risks of remote employees in order to enable the business to adapt quickly, work freely and collaborate effectively. Security teams know they can’t impede the cloud-based productivity that powers the WFH world of work. But accepting risk does not mean ignoring it, and here’s the troubling reality many security teams are missing: The data portability and user agility of the WFH world, combined with the acute pressures of the post-COVID business climate, combine to create a perfect storm of insider threat risks.



View Product Video  > View Demo Video
5 Ways to Maintain Complete Control of Data and Resources with Google EKM  > Download Whitepaper
Data security and privacy concerns are the biggest barriers to rapid cloud adoption. For organizations collecting, processing, analyzing, and retaining sensitive or regulated information, maintaining complete control over it is critical. Current cloud architectures require a completely different trust model, as the fear of losing control can quickly become a blocker.

Financial Services Companies - Own Your Share of Responsibility in Cloud Security  > Download Whitepaper
How can financial services companies embrace the benefits of the cloud while minimizing the impact of its risks? This guide offers insights that define the scope of your responsibilities in cloud security and best practices for wherever you are in your journey to the cloud.




Financial Services Companies - Own Your Share of Responsibility in Cloud Security  > Download Whitepaper
How can financial services companies embrace the benefits of the cloud while minimizing the impact of its risks? This guide offers insights that define the scope of your responsibilities in cloud security and best practices for wherever you are in your journey to the cloud.



Watch Splunk's Demo Video  > View Demo Video
How Splunk Can Drive Your Data Strategy in the Fight Against Financial Crime  > Download Whitepaper
Fighting financial crime is tough. Building a solution that addresses financial crime can be a lot tougher. The secret to tackling financial crime in the digital age lies in the data, so it’s imperative that you develop a data framework that’s as comprehensive as cybercriminals are persistent.



WATCH "BEYOND IDENTITY IN ACTION"  > View Demo Video
WHY PASSWORDS STINK  > Download Whitepaper
Investigate why passwords are fundamentally insecure and new secure authentication methods that are frictionless for end-users and easy to implement with an existing identity and access technology stack.



Reimagine Your Perimeter  > View Demo Video
Netskope Security Cloud Platform - Data-centric. Cloud-smart. Fast.  > Download Whitepaper
The cloud is transforming your organization. It’s changing how you work as everything is becoming more intuitive, connected, open, and collaborative, and that change is rippling across SaaS, IaaS, and web environments. This creates new challenges and risks that legacy security solutions can’t address. You need security that can protect your data and users, wherever they are.



SaltMiner Demo Video  > View Demo Video
Application Security That Won’t Slow You Down  > Download Whitepaper
The demands of today’s market won’t let software development wait for security to catch up. Saltworks has the expertise and experience to help you take your program from planning to reality quickly, efficiently, and predictably.



Watch "Strengthen your threat detection and response capability with Secureworks® Red Cloak™ Threat Detection & Response "  > View Demo Video
Detect and Stop Advanced Threats Faster to Reduce Security Risk  > Download Whitepaper
This white paper, written by Enterprise Strategy Group (ESG) principal analyst Christina Richmond, defines the key solutions that security programs will need to leverage in order to improve TDR, including:
- SOAPA (Security Operations and Analytics Platform Architecture)
- Machine and deep learning
- Human analysis
- Automation
- Behavioral playbook mapping



Watch ShieldX Demo Video  > View Video
ShieldX Elastic Security Platform Technology Paper  > Download Whitepaper
Technology infrastructure is evolving quickly and changing everything. DevOps and cloud architectures (Software as a Service (SaaS) and Infrastructure as a Service (IaaS)) have started to show the cracks in the existing security foundation. Historically security was done mostly by fortifying the perimeter of the network, assuming that the adversaries were largely external. That architecture is no longer e ective, as there is an incongruity between the physical datacenter boundary and virtual perimeters. Those new perimeters can take up any size and shape and change at cloud speeds making it impossible for traditional security to keep pace. Additionally, the security controls o ered by cloud vendors are less mature than traditional options and are often no match against advanced attacks hindering secure cloud adoption.



WATCH XM Cyber's 3 Minute Demo  > View Demo Video
Automated Breach and Attack Simulation: The Cost and Risk Reduction Revolution is Here  > Download Whitepaper
Chief information security officers (CISOs) are facing the biggest challenge of their careers: building resilient, impenetrable, and user-friendly IT environments in their organizations. Businesses have a growing number of endpoints connected to their devices. Frost & Sullivan estimates that there were 2.32 billion endpoints globally in 2019. 1 For an enterprise, the sheer volume of endpoints connected to its network expands its attack surface; keeping track of these endpoints is an enormous task f or security teams.