Whitepaper

This report, produced by leading compliance assessor Coalfire, outlines how CrowdStrike Falcon can assist organizations in their compliance efforts with respect to National Institute of Standards and Technology (NIST).

Added: October 09, 2020
Whitepaper
Added: October 09, 2020
Whitepaper
Added: October 08, 2020
Whitepaper
Added: September 11, 2020
Whitepaper

The Cybersecurity Maturity Model Certification (CMMC) will soon be a requirement for any company doing business with the Department of Defense. Is your organization prepared?

Added: September 03, 2020
Whitepaper

Cloudera SDX provides enterprise-grade security and governance on all data and metadata, with dedicated, integrated interfaces to manage it.

Added: August 06, 2020
Whitepaper

In partnership with reseller partner, CTG Federal, we created this piece based on an interview with Steve Grewal, focusing on data management at the tactical edge, the DoDs data consolidation challenges and opportunities for technology and process improvements.

Added: July 22, 2020
Whitepaper

​Learn how ​Cloudera can help you choose the right stream processing engine for organization's needs by analyzing key technical and operational differentiators between four modern stream processing engines from the Apache open source community.

Added: July 21, 2020
Whitepaper

CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.

Added: July 21, 2020
Whitepaper

Eight years after former Forrester analyst John Kindervag introduced the Zero Trust model, the concept has hit the mainstream. As current Forrester analyst Chase Cunningham says, 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement the zero-trust model. In this guide, we’ll look at the first step to implementing zero trust: asset management.

Added: July 21, 2020
Whitepaper

Today, security professionals face many challenges in cybersecurity asset management, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, and workplace modernization like BYOD continue to complicate this situation. Organizations must understand the depth and breadth of the devices on their network.

Added: July 21, 2020
Whitepaper

This white paper highlights how automating both device discovery and making VA tools aware of new devices that should be scanned can enforce security policies, increase the ROI of vulnerability scanning investments, and strengthen an organization’s overall security posture.

Added: July 21, 2020
Whitepaper

In this short paper, we’ll look at what constitutes an “unmanaged” device, approaches to discovery, and how continuous data aggregation and correlation helps automate unmanaged device discovery.

Added: July 21, 2020
Whitepaper

Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base.

Added: June 08, 2020
Whitepaper

This paper intends to examine the information security risks innate to the public sector IT supply chain for software and hardware, and their effect on the integrity and availability of federal IT systems and data. It will also enumerate the various standards and impending bills governing the security of the public-sector supply chain.

Added: June 03, 2020