T.E.N. Knowledge Base

ISE® West 2020

2020 DATA EXPOSURE REPORT  > Download Whitepaper
- Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today’s digital workplace
- 36% of workers believe that the increased emphasis on file-sharing has made them more complacent about data security
- 51% of the workers surveyed believe that the risk to corporate data when employees depart is bigger than organizations think

Qualys readies its next-gen vulnerability management offering  > Download Whitepaper
Qualys is launching Vulnerability Management, Detection and Response (VMDR), an upgrade to its widely used vulnerability management service that is designed to incorporate an expanded set of requirements.

ShieldX Elastic Security Platform Technology Paper  > Download Whitepaper
Technology infrastructure is evolving quickly and changing everything. DevOps and cloud architectures (Software as a Service (SaaS) and Infrastructure as a Service (IaaS)) have started to show the cracks in the existing security foundation. Historically security was done mostly by fortifying the perimeter of the network, assuming that the adversaries were largely external. That architecture is no longer e ective, as there is an incongruity between the physical datacenter boundary and virtual perimeters. Those new perimeters can take up any size and shape and change at cloud speeds making it impossible for traditional security to keep pace. Additionally, the security controls o ered by cloud vendors are less mature than traditional options and are often no match against advanced attacks hindering secure cloud adoption.

How Splunk Can Drive Your Data Strategy in the Fight Against Financial Crime  > Download Whitepaper
Fighting financial crime is tough. Building a solution that addresses financial crime can be a lot tougher. The secret to tackling financial crime in the digital age lies in the data, so it’s imperative that you develop a data framework that’s as comprehensive as cybercriminals are persistent.

Automated Breach and Attack Simulation: The Cost and Risk Reduction Revolution is Here  > Download Whitepaper
Chief information security officers (CISOs) are facing the biggest challenge of their careers: building resilient, impenetrable, and user-friendly IT environments in their organizations. Businesses have a growing number of endpoints connected to their devices. Frost & Sullivan estimates that there were 2.32 billion endpoints globally in 2019. 1 For an enterprise, the sheer volume of endpoints connected to its network expands its attack surface; keeping track of these endpoints is an enormous task f or security teams.