Whitepaper archive

Latest whitepapers:
Thumb original thoughtspot top 10 sda evaluation criteria de  1

Such- und KI-gestützte Analyse: Die Top 10 Bewertungskriterien

Daten werden manchmal als das Öl der Zukunft bezeichnet. Durch die explosionsartige Zunahme von Datenquellen und neuen Technologien für ihre Erfassung entstehen für Unternehmen ungeahnte Möglichkeiten. Doch in diesem neuen Best...

To the download
Thumb original thoughtspot spotiq ai driven analytics whitepaper 2nd edition de  1

SpotIQ - Automatisierte Insights für Alle

Künstliche Intelligenz (KI) und Maschinelles Lernen fesseln unser Vorstellungsvermögen seit Jahrzehnten. Schon in den 1950er-Jahren hatten Forscher Computerprogramme entwickelt, die die grundlegende Intelligenz bei der Interakt...

To the download
Thumb original thoughtspot relational search white paper 2nd edition de  1

Relationale Suche: Ein neues Paradigma für die Datenanalyse

Daten werden immer mehr zum wertvollsten Kapital der Unternehmen. Diejenigen Unternehmen, die ihre Daten in wertvolle Erkenntnisse verwandeln, eröffnen sich damit zahlreiche Möglichkeiten. Trotzdem sind schnelle und einfache Er...

To the download
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. ...

To the download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need matu...

To the download
Thumb original uk swift white paper

LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addition to banks, the system is a...

To the download
Thumb original uk security operations maturity model white paper

Security Operations Maturity Model

This white paper explores how to assess and evolve the principle programmes of the security operations centre (SOC): threat monitoring, threat hunting, threat investigation and incident response. LogRhythm developed the Threat ...

To the download
Thumb original uk defeating threats through user data ueba white paper

Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches — whether maliciously or accidentally. Case in point: 69 per cent of orga...

To the download
Thumb original uk budgeting for a modern siem white paper

Budgeting for a modern SIEM

For CEOs, growth is a welcome challenge — it’s an indicator that business is healthy. But growth also poses a real challenge for CISOs for two reasons: First, when budgeting for a security information and event management (SIEM...

To the download
Thumb original de the security operations maturity model quick reference guide brochure

Das Security Operations Maturity Model – Schnellübersicht

Unternehmen sollten ihre Sicherheitsabläufe als kritischen Geschäftsprozess betrachten. Schließlich sind effektive Sicherheitsabläufe die erste Verteidigungslinie gegen Cyberangriffe. Um diese Effektivität zu gewährleisten, bra...

To the download