Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

White Paper | Presented by Verizon

5 Ways UC Makes IT a Hero

IT teams take pride in delivering unified communications (UC) solutions to colleagues. Employees appreciate the many ways this service helps them collaborate, and get more done faster, with easy-to-use tools accessible almost anywhere on almost any device. It’s much simpler now to be an IT star. Just add UC to the IT toolbox.

White Paper | Presented by Verizon

Deliver Communications Your Customers Can Count On

When customers turn to you for support, they expect you to be available. While today’s business communications solutions tend to focus on technologies like live chat and mobile apps, a dependable phone system is still just as important as ever. But installing and maintaining an on-premises solution can run up costs and resources.

White Paper | Presented by Verizon

Drive Better Business Outcomes by Enhancing Collaboration

As technology levels the playing field across most industries, the success of your business relies even more on improving the interactions between your employees and the people and data they work with. By better using collaboration tools and applications, your organization can streamline business processes, enhance productivity, and increase agility to gain a competitive advantage.

White Paper | Presented by Verizon

Driving Better Collaboration with One Experience, One Platform, and Many Options.

The needs of the business are leading to new ways for people to collaborate together and helping them get the information they need, when they need it, and enabling people to communicate from virtually anywhere at any time.

White Paper | Presented by Verizon

Crypto-Jacking - Cryptocurrency-Mining Malware: the Peeled Onion

“Working for the man every night and day” – Creedence Clearwater Revival. Sometimes attackers care less about your proprietary information and more about your processing power. This incident demonstrated how a strong firewall can be undone with missed security patches, turning a client’s system into a stealthy cryptocurrency miner. 

White Paper | Presented by Verizon

Cyberespionage – the Katz-Skratch Fever

A manufacturing customer let the Verizon Threat Research Advisory Center know they'd been contacted by law enforcement regarding a possible data breach where foreign IP addresses were communicating with their systems. This case describes how 'Mimikatz', a powerful credential theft tool favored by particular nation-states, was installed through the careful targeting of a single, strategically placed individual. 

White Paper | Presented by Verizon

Insider Threat: The Card Shark

For this case, the Verizon Threat Research Advisory Center was engaged to conduct a Payment Card Industry (PCI) forensic investigation on unauthorized ATM withdrawals. What we found was a network and physical security structure flawed from start to finish. Walk through the investigation with us to see the many process and policy challenges that enabled this attack. Read the full story.

White Paper | Presented by Verizon

PoS Intrusion – the Faux PoS

Reliance on third-parties has increased as organizations focus on their core business strengths while allowing expert vendors to handle selective domains. But this global brick-and-mortar company was in for an unpleasant surprise as their point-to-point encryption (P2PE) solution provider for their payments system turned out to be neither encrypted or a solution.

White Paper | Presented by Verizon

Social Engineering – the Spiked Punch

Phish is not just an American rock band, as a manager in the Finance department discovered the hard way. It seemed like a standard request from a vendor, so what were the clues that could have stopped this expensive lesson? Moreover, what steps could be put in place to stop it from happening again?

White Paper | Presented by Verizon

Web App Attack: The Tuple-Row Honey

It was a hackathon to screen prospective job applicants for a technology company – what could go wrong? However, when the hackathon is hacked, leading to a breach of PII, the Verizon Threat Research Advisory Center is called in to identify the problem. Sometimes it’s not all fun and games. 

Load More