TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Will Virtual Agents Improve Your Support Model?

by ServiceaideJun 29, 2018

Artificial intelligence has been explored for decades and it is now a normal part of our daily lives. It only makes sense to rethink traditional IT service delivery and enhance the customer experience with real-time, intelligent support using a virtual assistant.


Understanding the Difference between an Asset and a Configuration Item

by ServiceaideJun 29, 2018

The technology industry is full of buzzwords and acronyms that constantly change based on new innovations and current trends. Two important terms that all IT professionals should understand are 'asset' and 'CI.' The difference between these two essential IT concepts is one of the most frequently asked ITSM questions.


Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

IN THIS REPORT:
• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance


The Next Generation of IT Support

by InformationWeekJun 08, 2018

This InformationWeek Trend Report explores the shift to a distributed workforce and how IT can enable and support the transition.

IN THIS REPORT:

• Explore how emerging technologies like artificial intelligence and machine learning are improving tools for collaboration, help desk support, and network and systems monitoring
• Learn about the benefits of a remote workforce and how to overcome the challenges of IT support
• Understand how the cloud is


Identity and Access Management Program Primer

by OptivMay 01, 2018

As the enterprise perimeter dissolves, compliance mandates are becoming increasingly detailed around access to data and intellectual property that is increasingly off-premise. Failing to address identity and access management with a holistic access strategy cripples security performance, increases IT overhead and adversely affects profitability. This IAM primer offers an overview of how to transform an IAM team to leaders in providing IAM security program maturity.


Unstructured Data Risk Assessment

by OptivMay 01, 2018

As your organization grows, are you concerned about the risks associated with the exfiltration of sensitive corporate data that has been exported to unstructured files, such as PowerPoint, Word or Excel? And, how that same unstructured data is liable to compliance requirements? Understand more on how Optiv can provide a review of your environment focusing on a risk assessment for both Active Directory and unstructured data.


Privileged Access Managed Service

by OptivMay 01, 2018

Is your organization short on skilled resources for managing and monitoring your privileged access management environment? Learn more on how Optiv's PAM engineers and threat analysts, can help control costs, increase security and reduce risk of a breach related to privileged accounts.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Optiv

Headquarters: Denver, CO

Your cyber security needs are every bit as unique as your business. That's why we work closely with you and your team to plan, build and run successful security programs tailored to your needs. Although the demands and complexities of cyber security evolve rapidly, we've got your back.

When you work with us, you get the benefit of our:

  • Deep industry insight, based on more than 20 years combined experience
  • Proven know-how from over 1,200 experts, including former CIOs and CISOs, risk experts, compliance experts, software engineers, researchers, white hat hackers, engineers, architects and more
  • Strategic partnerships with more than 350 leading and emerging security technology providers, so you get the right solutions the knowledge to make it all work together
  • Proprietary technology platform and tools based on experience we've gained from thousands of engagements with leading businesses in many industries

As a result, you achieve more efficient solutions, more optimized implementations and greater scale. Working together, we meet the challenges of security head on so you can do business with confidence.


Serviceaide

Serviceaid's vision is to re-invent Service Management with the power of Artificial Intelligence. Data problems have plagued the service management industry for years. We have married a world-class ITSM SaaS solution with innovative big data technology and Artificial Intelligence to solve these problems.