Resource Library

Featured Assets

SANS Evaluator’s Guide to NGAV

Legacy antivirus does not stop the malware and non-malware attacks companies face every day, so customers are looking for next-generation antivirus (NGAV) products that will. Yet with all these new technologies, many are confused about what they should be looking for. In this guide by SANS, the most trusted and, by far, the largest provider...

Carbon Black Threat Report: Non-Malware Attacks and Ransomware Take Center Stage in 2016

Non-Malware Attacks and Ransomware Take Center Stage in 2016 According to Carbon Black research, attackers are holding data for ransom at an alarming rate and continuing to deploy attacks across every industry. Attackers are increasingly utilizing non-malware attacks in an attempt to remain undetected and persistent on organizations’ enterprises. In this Threat Report, Carbon Black...

Get the Forrester Wave Endpoint Security Report

Carbon Black: Named a “Leader” in Forrester Wave Endpoint Security Report According to The Forrester Wave™: Endpoint Security Suites, Q4 2016 report, “antivirus technologies have become less effective at protecting employee endpoints and servers. Numerous competing technology vendors have risen up to take aim at the stagnant antivirus market as a result.” As one of...

Stop Ransomware Before It Starts

Ransomware is on the rise. According to the FBI, an average of 4,000 ransomware attacks happen per day. Today’s businesses are routinely choosing to pay hefty ransoms rather than lose access to their intellectual property, patient records, credit card information, and other valuable business data. Simply put, targeted businesses are paying ransoms in order to...

Threat Advisor: Stop Ransomware with Carbon Black

Every year, CryptoLocker and its variants, collectively known as Ransomware, target new verticals and find fresh victims. Ransomware makes itself known by presenting users with a message indicating that their critical files have been encrypted and offering to decrypt the files for a fee, usually in bitcoin, US Dollars, or Euros. The attackers threaten to delete the private…

Filter Assets by Type

Case Studies Data Sheets eBooks Infographics Reports White Papers Threat Advisors