Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Blue Coat Systems

Below you will find reports with the source of “Blue Coat Systems”

image from 2015 Mobile Malware Report

2015 Mobile Malware Report

This document deals with malware on mobile devices.

Added: October 26, 2018
image from Cyberthreat Defense Report

Cyberthreat Defense Report

This docuement was created to Empower your organization to shift focus from protection to exploring new possibilities with a unified Lifecycle Defense.

(more available)
Added: October 19, 2018
image from 2016 Shadow Data Report

2016 Shadow Data Report

The Shadow Data Report published by Elastica CloudThreat Labs, addresses key trends and challenges facedby enterprises securing data stored and shared via cloudapps and services.

(more available)
Added: October 16, 2018
image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.

(more available)
Added: October 14, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)