Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Bolstering Your Enterprise Cyber Risk Assessment

by Inspired eLearningJul 14, 2021

Businesses constantly prepare for security breaches, but they don?t always understand exactly how an attack or breach can affect the business. In this webinar, we?ll explore how the impact associated with existing threats and data breaches affect cost and downtime, and how to measure and quantify those costs so they can be reported to corporate decision makers. Being able to better understand your risk assessment will help you to better implement the technologies and processes tailored for


The Threat Hunter's Toolkit: Traits, Techniques, and Favorite Tools of the Trade

by Palo Alto Networks, Inc.Jul 14, 2021

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of ?threat hunting,? in which the security team takes a more proactive approach --seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat


5 Cloud Contact Center Best Practices for 2021

by LifesizeJul 14, 2021

Personalized customer service and experience are more important than ever. With today?s hybrid work environment, that means the agent experience will also have to change and adapt. When choosing your contact center solution, you need to keep your agents top of mind. So how does your business lay the groundwork for that agent experience to maintain productivity and engagement? This webinar will provide best practices for rolling out a seamless experience for agents as they navigate the new

  • Cloud
  • Contact Centers
  • Workforce
  • Productivity
  • Details

Incident Readiness and Building Response Playbook

by Dark ReadingJul 14, 2021

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this special report, learn the Xs and Os of any good security incident

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Risk Management
  • Details

Dirty Little Secrets of Business Intelligence: Six Challenges to Adoption

by enVistaJul 14, 2021

In a world where data is the new currency, the company with the best business intelligence (BI) wins. Businesses that are best able to collaborate using keen insights from data make better decisions with greater resiliency and agility. That's a big reason why 83 percent of enterprise executives are pursuing big data projects, according to Forbes. Unfortunately, many organizations face unforeseen challenges that prevent BI success.

Download this white to learn:
• Six most

  • enVista
  • Big Data Analytics
  • Big Data
  • Details

Weaknesses in Software Supply Chains: Cyber’s Unspoken Reality

by Immersive LabsJul 13, 2021

Until the recent SolarWinds compromise, the conversation around supply chains ? and more importantly, their vulnerabilities ? was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. And when the core software supply chain itself is compromised, the results are often catastrophic. In this webinar, we?ll examine the weaknesses in software supply chains and what organizations should consider

  • Vulnerabilities & Threats
  • Details

Integration Platform as a Service for Order Management Systems: Why Should You Care?

by enVistaJul 13, 2021

Enterprise order management systems (OMS) need to orchestrate orders but also orchestrate data, as well as monitor and manage the data flow between all endpoints. Integration Platform as a Service (IPaaS) for OMS can remove the burden from the customer by extending the REST APIs to the business and by mapping the data via its integration framework to the customer's endpoints. In this white paper, you will:

• Understand present day commerce
• Gain insight into

  • enVista
  • Security platforms
  • Endpoint Security
  • Details

Are Your Managed Services Right for Your Business?

by enVistaJul 13, 2021

Whether a managed services provider is a good fit for a business can be determined by looking at overall business goals (immediate and long-term), assessing the monthly recurring payment cost structure and determining if internal resources could use supplementation to operate more efficiently. A managed services partner helps streamline needs, enable growth and allow businesses to focus on other high-value priorities. Download this whitepaper to:

• Uncover the strategic

  • enVista
  • Network and Systems Management
  • Unified Communications
  • Details

GRC Buyer's Guide - 5 Steps to Success

by Navex GlobalJul 12, 2021

The current business landscape is increasingly defined by complex operations that include integrated technologies, processes and sociocultural trends resulting in progressively global markets, supply chains and vendors. This has contributed to a rapid expansion in the number and types of risks that organizations routinely face, as well as a complex regulatory environment that changes almost daily. To meet these challenges, organizations require a Governance, Risk and Compliance (GRC) platform to

  • Navex Global
  • Risk Management/Security
  • Cybersecurity
  • Details

The 7 Step Guide to Third Party Risk Management

by Navex GlobalJul 12, 2021

As a risk professional, unexpected risks from various third-party relationships have the potential to hurt your company's bottom line. How do you keep up with business demands to expand and diversify your third parties while properly managing and mitigating risk from those relationships?

For guidance, download the 7 Step Guide to Third-Party Risk Management to learn steps to embed effective third-party risk management practices into your growing value chain.

Navigate

  • Navex Global
  • Risk Management
  • Cybersecurity
  • Details