Resource Center


White Papers

One Hospitality Case Study Download Case Study
Meeting PCI Wireless Requirements Download Data Sheet
PCI Security Data Sheet Download Data Sheet
PCI Security & POS Systems Download Whitepaper
2017 BYOD Concerns in the Workplace Download eBook
Security in the Age of Bluetooth Download White Paper
2016 Internet of Evil Things (IoET)  “The Internet of Evil Things (IoET) Report 2016
5 Steps to Defend Your Network Against Bluetooth Download White Paper
White Paper: A Practical Approach to Developing a Cyber Security Strategy  Part II: The Tools and Capabilities: Networks are living, dynamic things and  there’s no such thing as a silver “security” bullet. Ignoring new threats is  choosing to ignore a huge swath of the battlefield, but existing security  assets need to be used to their best potential. Download eBook
Centralized Vulnerability Assessments and Remote Pen Testing Across your  Enterprise  Your enterprise isn’t in one location, it is distributed, whether across the  street or across the globe. That poses a challenge for you in centralizing your  vulnerability assessment across the enterprise and introducing remote  penetration testing that will keep each location more secure. Download White Paper
Securing Wired and Wireless Connections at Remote Locations  The proliferation of wireless access points has exponentially expanded the  enterprise attack surface. But you already knew that, right? So how can you  better secure both your wired and wireless connections, including those at  remote locations? Oh, and do it without traveling around everywhere? Download eBook
Industry Report: The Internet of Things and Its Rapidly Emerging Threats  The Internet of Everything has arrived and alongside every great technology  trend comes a challenging and loosely-defined threat vector. With the rush to  Internet-enable everything from wristwatches to power grids, the massive  proliferation of smart devices has significantly expanded the attack surface of  our interconnected world. Download eBook


Why You Need to Take Another Look at Network Security in 2017 Watch the Webinar
Are You Serious? Now I Have to Worry About BYOD and IoT Threats?  We know it sucks, but BYOD and IoT are changing the way employees access your  company’s data. Next year more than 50% of the devices connecting to enterprise  networks will be owned by employees.  Watch Now
You Thought Going to High School Was Tough? Try Being the IT Director! Watch Now
Can PCI DSS Be A Threat To Your Enterprise?  ISOs and IT security experts agree that PCI DSS is one of the most important  and influential information security standards for retailers, banks, credit  unions, payment processors and just about anyone who handles credit, debit or  payment cards. Watch Now
Sans: Jumpstarting The Critical Security Controls With Intelligent Asset  Discovery  Widespread adoption of the Critical Security Controls has proven that it is an  effective and efficient way to focus first on the security processes that are  necessary to detect, mitigate and avoid advanced targeted threats. The first  three Controls focus on having up to date and accurate knowledge of the devices  and applications that are on your enterprise networks.  Watch Now
BYOD Policy in Financial Services; or 'What Happened to the Blackberry?'  The financial services industry is famous for company-supplied devices, most  famously the ubiquitous BlackBerry. Today, however, BYOD (Bring Your Own  Device) has become the approach. Watch Now
Protect Your Network From Employee Owned Devices  Colby, Lead Information Security Analyst & Security Architect, is responsible  for all things security at a leading energy company. Join this webinar to learn  how Colby uses Pwnie Express to provide the open, BYOD IT environment his  business demands, while meeting the strict compliance regulations of the energy  sector. Watch Now
Your WiFi is Infected with Devices  Everything is connected: your computer, your phone, your watch, and now your  thermostat (and oven and car and…). This poses some real issues with today’s  wireless security policies and how to put together a sane plan to keep your  network secure. Watch Now
See Paul Paget on Fox25 Talking About IoT Security    Watch Interview

Product Demos

What’s New In Pulse: Threats And Reports Description  Join Yolanda Smith, Pwnie Express Product Manager, to get an in-depth look  into best practices using Pulse’s newly improved features, including the Threat  Analytics Engine and automated reporting. In addition, a “mini-review” of Pwn  Pulse will put these updates into context. Watch Now
The Pentester’s Edge: How To Get The Most Out Of The Pwnie Express Sensors  Are you a pentester, security admin, red team member, or other security  professional? Listen to this product informational webinar and get an overview  and hands-on demo of the various Pwnie Express solutions and sensors for  on-site pen testing, remote pen testing, and automated vulnerability assessment  of multiple sites. Watch Now
2016 Internet of Evil Things (IoET)  “The Internet of Evil Things (IoET) Report 2016
Request a Demo  You have a device visibility problem. Whether it is called BYOD, BYOx, IoT, or  some other acronym, the fact is every workplace of every size needs to see the  phones, laptops, access points, printers, and more in and around their network. Get A Demo