TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

IN THIS REPORT:
• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance


Protecting Against the Top 5 Attack Vectors

by Arctic Wolf NetworksJun 08, 2018

Are You Secure from the Top Five Forms of Cyberattacks?

Arctic Wolf's security experts spend each day on the front lines of today's cyberwars, protecting customers from cyberattacks in an increasingly dangerous threat landscape. As breaches occur with greater frequency, businesses of every size need to enhance their cybersecurity postures.

As in any battle, it's critical to recognize the enemy and know what you're up against. In this eBook, "Protecting Against the Top 5 Attack


Combat the Top Five Cyberattacks with Managed Detection and Response

by Arctic Wolf NetworksJun 08, 2018

Cyberattacks are disrupting businesses of all sizes more than ever before. Cybercriminals use a variety of techniques to gain access to data, but five methods stand out above all others. Learn about how to detect these attacks and what you can do in response to mitigate any potential damage to your firm's assets.

Download the white paper to see why MDR is a key solution for SMEs in addressing these challenges, enabling them to benefit from the advanced technology and security expertise


Coping with the Cybersecurity Skills Gap

by Arctic Wolf NetworksJun 08, 2018

With digital transformation comes exponentially more data, and a higher number of data breaches. Making matters worse, ransomware has now become a billion-dollar industry. Hackers' willingness to go the extra mile for illicit gain is not surprising, but the fact that they continue to succeed is. The past few years have revealed that much of the cyberthreat landscape's squalor stems from a well-documented shortage of cybersecurity experts. So, how do you solve the global shortage of cybersecurity


The State of IT and Cybersecurity

by Dark ReadingJun 10, 2018

As cybersecurity has grown and become more critical in recent years, it increasingly has become viewed as a discipline separate from general IT. In many companies, the security department works independently of the IT department; in some companies, the chief information security officer (CISO) reports to someone other than the head of IT.

This report from Dark Reading shows today's IT groups play a critical role in information security — a role that is more extensive and more


Build or Buy? The Pros and Cons of Customer Identity & Access Management (CIAM) Implementation Options

by JanrainJun 10, 2018

This white paper explores the pros and cons of in-house software development vs. commercial off-the-shelf CIAM solutions and provides a framework for assessing risk and comparing total cost of ownership (TCO), including:

• Criticality considerations for identity solutions
• Build options - comparing on-premise, private cloud and public cloud
• Calculating cloud costs compared to on-premises infrastructure
• Leveraging free or open source software
• Buy


Evaluate CIAM Solutions with this Sample RFP

by JanrainJun 10, 2018

Use this sample customer identity and access management (CIAM) RFP as a handy starting point when working with your teams and stakeholders to identify your organization's CIAM requirements.


Survey: 94% of Consumers are Concerned About Data Privacy

by JanrainJun 10, 2018

Read this survey for insights from over 1,000 U.S.-based consumers about data privacy in the wake of GDPR and other data privacy scandals. Here are some highlights:
• The Cambridge Analytica breach incited a major turning point in the way consumers feel about their data privacy
• Many American consumers are in favor of regulations designed to give them greater control over how businesses use their personal data
• 94% of US consumers are concerned about data privacy


Case Study: How Slate boosted registrations more than 30% with improved UX

by JanrainJun 10, 2018

Learn how leading media publisher Slate used social login and registration to improve user experience and increase site registrations.


Choosing a cybersecurity solution – 11 key points to consider

by ibossMay 23, 2018

Choosing the right cybersecurity solution is challenging. You need to protect your organization from increasingly sophisticated threats, but you don't want to consume valuable IT resources with complex management and reporting requirements. In a crowded vendor landscape, how do you find the most effective security for your organization?


SUBTOPICS:

Arctic Wolf Networks

Headquarters: 111 W. Evelyn Ave, Suite 115, Sunnyvale 94086

Arctic Wolf Networks provides SOC as a service that makes every link in the security chain stronger. Customer-dedicated security engineers anchor the service, act as the stewards of log data, and are focused on reviewing events, identifying incidents, and eliminating false positives.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


iboss

Since its inception, iboss has challenged the status quo in enterprise security, launching innovative, patented technology delivered direct-to-cloud via proprietary node-based cloud container architecture. iboss advanced threat defense features gives security professionals visibility into previously hidden communication channels, and the security tools needed to close the critical data protection gap that can leave even the largest networks vulnerable.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Janrain

Founded in 2002, Janrain pioneered Customer Identity and Access Management (CIAM) and is widely recognized by industry analysts as a global CIAM leader. The Jainrain Identity Cloud® provides identity management, security and activation solutions that enable seamless and safe customer insights. The company reaches over 1.5 billion identities with over 3,400 commercial deployments, including Coca-Cola, McDonald's, Pfizer, Philips, and Samsung. Janrain's identity capabilities:
• Social and traditional login and registration
• Single sign-on
• Customer profile data storage management
• Customer segments, customer insights and engagement solutions