Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Testing for Compliance Just Became Easier

by CymulateJun 21, 2019

Compliance has long been a fact of life for IT and security teams.

  • Cymulate
  • Cybersecurity
  • Risk Management/Security
  • Details

Telit Challenges Security Controls with Cymulate’s Breach & Attack Simulation

by CymulateJun 21, 2019

Telit Challenges Security Controls with Cymulate's Breach & Attack Simulation

  • Cymulate
  • Cybersecurity
  • Risk Management/Security
  • Details

The Essential Guide to Security

by SplunkJun 20, 2019

Learn how machine data can solve common security use cases and how to get started with the Splunk platform.

  • Splunk
  • Security Monitoring
  • Endpoint Security
  • Details

The Five Essential Capabilities of an Analytics-Driven SOC

by SplunkJun 20, 2019

Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks.This white paper dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels.

  • Splunk
  • Cybersecurity
  • Security
  • Details

The SOAR Buyer's Guide

by SplunkJun 20, 2019

Choosing the right platform to build your company's security operations center is arguably more important than choosing any point security product. But are you aware of the criteria you should consider when evaluating which Security Orchestration, Automation and Response (SOAR) platform to choose? Download the buyer's guide to learn how.

  • Splunk
  • Cybersecurity
  • Security
  • Details

4 Reasons to Add UBA to Your SIEM

by SplunkJun 20, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.

  • Splunk
  • Security
  • Risk Management/Security
  • Details

7 SIEM Trends to Watch in 2019

by SplunkJun 20, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.

  • Splunk
  • Risk Management/Security
  • Security Monitoring
  • Details

2019 Trends Report: The Zero Trust Journey

by OktaJun 20, 2019

As your workforce becomes more distributed, security is even more critical. Protecting the network is important but it?s no longer enough to secure applications and data. That?s why adoption of a Zero Trust security framework is on the rise. Interested in more data on how your peers are adopting Zero Trust to protect their apps, data and distributed workforce?


Darktrace Cloud Threat Report 2019

by DarktraceJun 20, 2019

This report summarizes nine case studies of cloud-based attacks that were identified by cyber AI, including spear phishing, insider threat, and critical misconfigurations. The case studies show how indicators of suspicious activity were only detectable using Darktrace AI, a self-learning, cloud-native technology which protects across hybrid and multi-cloud environments, as well as other digital environments.

  • Darktrace
  • Cloud Security
  • Cybersecurity
  • Details

Continuous Security Monitoring Platforms are Improving IT Security and Efficiency While Cutting Costs

by LockpathJun 20, 2019

IT and Security Operations departments roles have been evolving for years. What were once forgotten departments are now core operational business units within organizations. The new focus on digital aspects of the business, as well as the rapid onset of privacy and cybersecurity laws, are requiring IT and Security departments to protect digital assets and information, but also to more quickly and more effectively integrate their operations with compliance, audit, and other core business

  • Lockpath
  • Security Monitoring
  • Security Management & Analytics
  • Details