Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense

by GuardiCoreJul 16, 2019

When an online attacker penetrates your cyber defenses, he or she may take on the guise of an authorized user, making it possible to move laterally within your IT environment to steal information without detection. One growing strategy for limiting this lateral movement is network segmentation, which can restrict access to critical systems and help limit the damage caused by an online attacker. In this Dark Reading webinar, experts discuss methods for using network segmentation and

  • Network & Perimeter Security
  • Details

Data Science and AI in the Fast Lane

by InformationWeekJul 16, 2019

In this IT Trend Report IT leaders and business executives can gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success.

Read this Report to:
• Understand how fast data science is changing the world of business
• Get a view into the workplace of the future
• See how traditional software companies are adapting to a world of AI and data science
• Learn how AI

  • InformationWeek
  • Cybersecurity
  • Database Security
  • Big Data
  • Details

Domino's Case Study

by SynackJul 16, 2019

Domino's needed a smart and efficient way to weave together their development and security operations in an agile environment. Leveraging Synack's dynamic crowdsourced security testing platform, Dominos got this and more.

For Domino's CISO Ethan Steiger, his main task is to protect the bottom line by preventing business downtime... and make sure customers' pizzas are delivered on time.

"Synack is changing the way we do penetration testing... Our developers know that their

  • Synack
  • Risk Management/Security
  • Cybersecurity
  • Details

The Three Phases of a Successful Cloud Migration

by Hitachi VantaraJul 15, 2019

Enterprises everywhere are moving to the cloud to reap the financial, operational and technical benefits. However, their cloud objectives may range from reducing operational costs, increasing agility and improving productivity. To extract value from these cloud initiatives, it is imperative that organizations ensure their cloud projects are well structured and tied to specific outcomes. We consider three phases to be vital to a successful cloud migration.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

Clearing the Path to Cloud

by Hitachi VantaraJul 15, 2019

Read this case study to see how REAN Cloud, now part of Hitachi Vantara, worked with Amazon Web Services (AWS) to create a continuous integration and continuous delivery framework (CI/CD) to migrate Ellucian's portfolio of applications to the cloud.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

Demystify Your Cloud Journey

by Hitachi VantaraJul 15, 2019

View this infographic to identify important business factors as you embark on your cloud journey. Consider your DevOps, compliance, cloud operational efficiency needs and the hybrid and multicloud tools that can get you here.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

AI in the Contact Center: Balancing Automation and the Human Touch

by TalkdeskJul 10, 2019

In the customer experience (CX) era, businesses that are able to create an experience that delights become market leaders, while those that fail to do so lag behind and struggle to survive. For most enterprises, CX starts in the contact center, but providing a differentiated customer experience is about more than just having well-trained agents -- it?s about delivering personalized, contextual interactions while reducing the burden on the customer. And doing so while maximizing operational

  • Artificial Intelligence
  • Automation Technology
  • Customer Experience
  • Contact Centers
  • Details

State of the Cloud

by InformationWeekJul 10, 2019

Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. It will examine the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges.
The information submitted is collected by both Informa and our sponsor.

  • InformationWeek
  • Infrastructure as a Service
  • Cloud Services
  • Details

Know Your Enemy. Know Your Risk.

by eSentireJul 08, 2019

This report gets inside the mind of a hacker, analyzing their motivations for penetrating cyber defenses, their methods and the most effective ways to reduce your risk.

  • eSentire
  • Database Security
  • Cybersecurity
  • SMB Security
  • Cloud Security
  • Details

Four Cyber Security Essentials Your Board Wants to Know

by CymulateJul 08, 2019

Explaining your organization's security strategy and controls to a nontechnical audience can be challenging. Aligning that strategy against ever-changing threats and cyberattack techniques is even more challenging. Translating the strategy, threat landscape, and daily impact into meaningful risk metrics has traditionally been nearly impossible.

Yet, executive teams and boards of directors are asking for exactly that. They increasingly demand data that describes the potential impact

  • Cymulate
  • Cybersecurity
  • Security Monitoring
  • Details