description AV Replacement

AV Gap Analysis

Download AV Gap Analysis
build Endpoint Protection

2018 Cybersecurity Checklist

Get the checklist
classEndpoint Protection

Fileless Attack Survival Guide

Get the guide
build Testing

stackhackr™

Test your security
Filters:
eBooks clear Whitepapers clear Webinars clear Research clear Tools clear Videos clear Datasheets clear Barkly vs Malware clear Barkly EPP clear AV Replacement clear Ransomware clear Malware clear Machine Learning clear Endpoint Protection clear Testing clear

class eBooks

Ransomware

The True Cost of Ransomware

5 companies, 5 attacks, and the reality of recovery.

Read now
Endpoint Protection

IT Pro's Guide to Endpoint Protection

Learn how to protect your company from threats like ransomware and phishing with this guide on endpoint protection.

Read the guide
Malware

The Hype-Free Guide to Fileless Attacks

What are fileless attack techniques and how can you stop them? Here's everything you need to know in one practical security guide.

Read the guide
Malware

2017 Malware Trends in Review

How attacks are evolving and what to expect next.

Read now
Endpoint Protection

Endpoint Protection Buyer's Guide

The information you need to make evaluating and buying endpoint security easy.

Read now
Ransomware

The Ransomware Survival Handbook

Instructions for preventing, responding, and recovering from an attack.

Read now
Ransomware

The Complete Guide to Ransomware

Everything you need to know to prevent, stop, and recover from ransomware attacks.

Read the guide
Endpoint Protection

The Open Source Cybersecurity Playbook

Build a solid game plan for preventing cyber attacks and data theft.

Read now
Endpoint Protection

Phishing Emails: A Field Guide

Train your users to stop taking the bait.

Read now
Ransomware

Ransomware Protection 101

A prescriptive guide for hospitals and healthcare providers.

Read now
Endpoint Protection

The Amazing Security Awareness Playbook

Make user training engaging, practical, and actually effective.

Read now
Endpoint Protection

Cybersecurity Made Simple: A Getting Started Guide

A clear, step-by-step process for you take control of your security.

Read now
Endpoint Protection

The Realist's Guide to Cybersecurity Awareness

Tips from industry experts for engaging and empowering employees.

Read now
View more +

description Whitepapers

AV Replacement

AV Gap Analysis

Download the AV Gap Analysis to learn how attacks are evading existing AV solutions to build your business case for AV replacement.

Download
Ransomware

Protect and Prevent: 3 Strategies for Blocking Fileless Attacks and Exploits

Find out how ransomware is going fileless to get past protection and what makes everyone a target.

Watch now
View more +

ondemand_video Webinars

Ransomware

2017 Trends and Strategies for Protecting Endpoints in Healthcare

Learn more on how healthcare cybersecurity attacks have changed in 2017, trends around fileless malware and ransomware attacks, and strategies for improving your healthcare organization's endpoint security.

Watch now
Ransomware

Protect and Prevent: 3 Strategies for Blocking Fileless Attacks and Exploits

Find out how ransomware is going fileless to get past protection and what makes everyone a target.

Watch now
Ransomware

The Science Behind the Hype: Machine Learning in Endpoint Security

This webinar will demystify the actual science of machine learning, and explore the next evolution in endpoint security machine learning.

Watch now
Ransomware

Blocking Fileless Attacks and Exploits

Jack Danahy, CTO at Barkly, discusses how ransomware is going fileless to get past protection & what makes everyone a target.

Watch now
Ransomware

Floppy Disks to Fileless

Watch this on-demand webinar to hear Jack Danahy, Barkly CTO, discuss how the threat of Ransomware has grown and changed over time

Watch now
Malware

2017 Malware Trends

WannaCry, NotPetya, Emotet and more

Watch now
Ransomware

The True Cost of Ransomware

3 Companies, 3 Attacks, and the Reality of Recovery

Watch now
Malware

Fileless Cyber Attacks Demystified

Jack Danahy, CTO at Barkly, discusses how attackers are using fileless techniques to gain execution, persistence, & lateral movement, & what you can do to keep your company protected.

Watch now
View more +

search Research

Ransomware

2017 Ransomware Report

The 2017 Ransomware Report reveals how organizations perceive the growing threat of ransomware and the business impact of these attacks.

Get the report
Endpoint Protection

Cybersecurity Confidence Report

How confident are you in your security program? Find out where you stand based on 350 IT pros' top cybersecurity priorities, needs, and concerns.

Get the report
View more +

build Tools

Ransomware

Ransomware Risk Assessment

How vulnerable are you to ransomware attacks?

Check your risk
Endpoint Protection

2017 Cybersecurity Checklist

Are you focusing on the right things to protect your company against the latest threats?

Read now
Ransomware

Ransomware Decryption Tool Finder

Unlock encrypted files without paying a cent.

Search now
View more +

videocam Videos

Barkly vs. Malware

Barkly blocks Ursnif

See Barkly in action against one of the most active, widespread banking trojans in the world.

Watch now
Barkly vs. Malware

Barkly blocks Silence

See Barkly in action against the stealthy banking trojan, Silence.

Watch now
Barkly vs. Malware

Barkly blocks a Microsoft Office DDE attack

See Barkly block attempts to exploit Microsoft's Dynamic Data Exchange (DDE) feature.

Watch now
Barkly vs. Malware

Barkly blocks Virlock

See Barkly in action against the viral, polymorphic ransomware Virlock.

Watch now
Barkly vs. Malware

Barkly blocks Goldeneye

See Barkly in action against the disk-encrypting successor to Petya ransomware

Watch now
Barkly vs. Malware

Barkly Blocks credential-stealing malware

Watch Barkly stop Ovidiy Stealer before it can harvest victim credentials.

Watch now
Barkly vs. Malware

Barkly blocks ransomware that makes $242K demands

See Barkly in action against Bit Paymer ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Lukitus variant of Locky

See Barkly in action against ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Gryphon ransomware

See Barkly in action against Gryphon, the latest variant of BTCWare.

Watch now
Barkly vs. Malware

Barkly blocks a fileless ransomware attack

Watch Barkly block an attempt to spread ransomware via PsExec.

Watch now
Barkly vs. Malware

Barkly blocks Locky variant

See Barkly in action against Diablo6, a variant of Locky ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Emotet trojan

See Barkly block a macro-based attack.

Watch now
Barkly vs. Malware

Barkly blocks WannaCry

See Barkly in action against the WannaCry ransomware.

Watch now
Barkly vs. Malware

Barkly blocks clickless PowerPoint malware

Watch Barkly block malware that exploits PowerPoint's mouseover function.

Watch now
Barkly vs. Malware

Barkly blocks Cerber

See Barkly in action against Cerber ransomware.

Watch now
Barkly vs. Malware

Barkly blocks macro-based malware

See how Barkly blocks macro-based attacks.

Watch now
Barkly vs. Malware

Barkly blocks QakBot banking trojan

See Barkly block one of the most advanced banking trojans currently active.

Watch now
Barkly vs. Malware

Barkly blocks Defray ransomware

See Barkly in action against Defray ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Dharma

See Barkly in action against Dharma ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Fireball

See Barkly in action against Fireball adware.

Watch now
Barkly vs. Malware

Barkly blocks Amnesia

See Barkly in action against Amnesia ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Dridex

See Barkly in action against the Dridex banking trojan.

Watch now
Barkly vs. Malware

Barkly blocks Spora

See Barkly in action against Spora ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Ursnif (Gozi)

See Barkly in action against the Ursnif (aka Gozi) banking trojan.

Watch now
Barkly vs. Malware

Barkly blocks Satan

See Barkly in action against Satan ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Revenge

See Barkly in action against Revenge ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Zepto

See Barkly in action against Locky variant Zepto.

Watch now
Barkly vs. Malware

Barkly blocks AES-NI

See Barkly in action against AES-NI ransomware.

Watch now
Barkly vs. Malware

Barkly blocks Mimikatz

See Barkly block an instance of the penetration testing tool, Mimikatz.

Watch now
View more +

description Datasheets