Information governance is an essential best practice for any organization, but particularly larger ones that must satisfy a complex set of regulatory, legal and other compliance demands. Sponsored by Micro Focus, Mimecast, Smarsh and Waterford Technologies.
This report compares and contrasts the respective approaches to information governance by NetGovern and Microsoft 365. It is offered to enable professionals with responsibility for information governance evaluating the move to Microsoft 365 to gauge suitability to task of the information governance tools offered by both vendors. Sponsored by NetGovern.
Best practice guidance around what decision-makers may want to consider as they navigate the current crisis and plan for future eventualities. Sponsored by Authentic8, BitTitan, Dropsuite, ENow Software, OVHcloud, Smarsh, VMware Carbon Black, Yubico and Zix.
Endpoints are being attacked in a variety of ways, including email-based phishing, ransomware, malware, and drive-by-downloads from web surfing. Robust endpoint protection is critical. Sponsored by Quest Software, Trend Micro and VMware Carbon Black.
Best practice guidance on defending against and recovering from cyber-attacks and threats, in order to strengthen preparedness and improve resilience in the financial services industry. Sponsored by Proofpoint, VMware Carbon Black and Yubico.
Why small and mid-sized businesses should deploy an email archiving solution, and why they should consider the use of a third-party solution instead of the native email archiving solutions within Microsoft 365. Sponsored by MailStore.
Examining the cybersecurity threats facing the healthcare industry, including an outlook and prescriptions for strengthening defenses across the industry. Sponsored by Egress, KnowBe4, Nyotron, VMware Carbon Black, Yubico and Zix.
An analysis of five pentest providers in two categories: Pentest as a Service and Security Technology Firms. Part 3 of a three-part white paper series. Sponsored by Cobalt Labs.
An analysis of eight pentest providers in three categories: Assurance Consultancies, Boutique Security Consultancies and Managed Bug Bounty. Part 2 of a three-part white paper series. Sponsored by Cobalt Labs.
The history and background of pentesting, including barriers to the procurement of pentesting capabilities. Part 1 of a three-part white paper series. Sponsored by Cobalt Labs.