TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

3 Ways to Simplify Your Contact Center in 2019

by TalkdeskApr 23, 2019

Customer experience has overtaken price and product as the top differentiator between brands. Your customers don?t care about spikes in interaction volume, agent training curves, or the mechanics of contact center technology. They simply want fast, efficient service. How do you manage an environment that is constantly changing without allowing it to negatively impact your customers?

  • Contact Centers
  • Customer Experience
  • Operations
  • Details

Ribbon Analytics Application Portfolio

by Ribbon Communications Inc.Apr 22, 2019

A 3600 understanding of IP data and RTC usage that delivers numerous use cases for services assurance, security and subscriber grow.

  • Ribbon Communications Inc.
  • Risk Management/Security
  • Security Management & Analytics
  • Details

STIR/ SHAKEN (Addressing Caller ID Spoofing)

by Ribbon Communications Inc.Apr 22, 2019

Keep communications free of calls coming through from various numbers that are fraudulent and known nuisance call.

This solution brief will focus on the source authentication process being developed by Ribbon Communications to solve the robo-calling plague.

  • Ribbon Communications Inc.
  • Mobile security
  • Risk Management
  • Details

Securing Real-Time Communications for Dummies Book

by Ribbon Communications Inc.Apr 22, 2019

Protecting your communications network starts with a deep understanding of attack vectors targeting SIP.

  • Ribbon Communications Inc.
  • Mobile security
  • Risk Management
  • Details

Brochure Ribbon: RoboProtect

by Ribbon Communications Inc.Apr 22, 2019

Keep communications free of calls coming through from various numbers that are fraudulent and known nuisance call.

  • Ribbon Communications Inc.
  • Mobile security
  • Risk Management
  • Details

Zero Trust in Practice

by OktaApr 18, 2019

Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start?


A Day in the Life of an OT Cybersecurity Expert

by PASApr 17, 2019

What are the critical must-haves and pitfalls to avoid when it comes to safeguarding industrial facilities in the age of the Industrial Internet of Things? Threats to the safety and security of critical infrastructure make headlines on a regular basis. CISOs and their IT teams may be ultimately accountable for the security of industrial control systems in critical industries such as oil and gas, refining, chemical processing and power generation, but they can benefit greatly from the expertise


Securing Cloud Native Workloads on AWS

by Aqua Security Software Inc.Apr 16, 2019

This white paper describes the shared responsibility security model and what's needed to secure workloads on Amazon ECS, EKS, Fargate and Lambda.

  • Aqua Security Software Inc.
  • Security Monitoring
  • Security
  • Details

A New World of IT Management in 2019

by InformationWeekApr 15, 2019

Years of dramatic changes in technology -- from analytics to AI, cloud to service-driven IT strategies -- and the business environment are culminating in new changes in how IT leaders manage their organizations. CIOs are carving out new roles for themselves and their teams, while new C-level titles are emerging with designations such as CDO and CISO, and IT organizations wrestle with the talent crunch.

This InformationWeek IT Trend report highlights a few of these changes in the IT

  • InformationWeek
  • IT Strategy
  • Security
  • Risk Management/Security
  • Executive Insights & Innovation
  • Team Building & Staffing
  • Details

Use Cases for Attack Surface Manager (ASM)

by Illusive NetworksApr 15, 2019

Learn how Illusive's customers are using ASM to stop the spread of credentials and connections, preemptively hardening the network.

  • Illusive Networks
  • Network & Perimeter Security
  • Security Monitoring
  • Details