Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

VMWare

Below you will find reports with the source of “VMWare”

image from Technical Threat Report 2021

Technical Threat Report 2021

This report, based on VMware’s experience with a diverse customer base, offers a comprehensive look at Linux-based malware threats to multi-cloud environments. It highlights the unique characteristics of this class of threats and provides guidance on how combining endpoint detection and response (EDR) and network detection and response (NDR) solutions can help organizations stay ahead of the threats Linux-based malware poses.

(more available)
Added: May 4, 2023
image from U.S. Security Insights Report 2021

U.S. Security Insights Report 2021

This research was conducted to understand the challenges and issues facing businesses in the United States (U.S.) when it comes to escalating cyberattacks. It identifies trends in hacking and malicious attacks, and the financial and repetitional impact breaches had in what has been an unprecedented year. It examines U.S. organizations’ plans for securing new technology, adopting a cloud-first security strategy, and dealing with the complexity of the current cybersecurity management environment.

(more available)
Added: May 4, 2023
image from Global Security Insights Report 2021

Global Security Insights Report 2021

This research was conducted to understand the challenges and issues facing businesses worldwide when it comes to escalating cyberattacks. It identifies trends in hacking and malicious attacks, and the financial and repetitional impact breaches had in what has been an unprecedented year. It examines organizations’ plans for securing new technology, adopting a cloud-first security strategy, and dealing with the complexity of the current cybersecurity management environment.

(more available)
Added: May 4, 2023
image from Global Threat Report June 2020

Global Threat Report June 2020

The global cyber threat landscape has escalated. In this, our third Global Threat Report, we find that attack frequency has reached unprecedented levels; 90% of security professionals said the volume of attacks they faced has increased. Attackers are employing a more diverse range of tactics and techniques than ever before as they bid to extort, disrupt and infiltrate organizations.

(more available)
Added: May 3, 2023
image from The state of incident response 2021

The state of incident response 2021

A survey driven analysis of 500 security leaders from firms with 700 or more employees and revenues of $500 million or more.

(more available)
Added: June 18, 2021
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back.

(more available)
Added: November 1, 2020
image from 2020 Cybersecurity Outlook Report

2020 Cybersecurity Outlook Report

An annual report using Carbon Black’s data sets of the Carbon Black Cloud customer footprint, Carbon Black User Exchange, public samples, Carbon Black Endpoint Standard data, and internal sources. Leverages the ATT&CK framework to determine common tools-techniques-processess (TTPs).

(more available)
Added: July 22, 2020
image from University Challenge: Cyber Attacks In Higher Education

University Challenge: Cyber Attacks In Higher Education

A report by VMware exploring the evolving threat for UK universities and how they can guard against cyber attacks to preserve their intellectual property

(more available)
Added: November 6, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from Three-Part Guide To Developing A BYOD Strategy

Three-Part Guide To Developing A BYOD Strategy

This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy”

Added: October 22, 2018
image from Bring Mac To The Enterprise With A Modern Approach To Management

Bring Mac To The Enterprise With A Modern Approach To Management

This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.

(more available)
Added: October 21, 2018
image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure.

(more available)
Added: October 20, 2018
image from A 360-Degree Guide To Choosing And Migrating To A New Email Client

A 360-Degree Guide To Choosing And Migrating To A New Email Client

This white paper seeks to offer some insight into migrating to a new email client.

Added: October 19, 2018
© Cyentia Institute 2025
Library updated: July 6, 2025 20:08 UTC (build b1d7be4)