Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Building a Security Culture

by VeracodeNov 14, 2019

Most successful cyber security incidents involve a human at your business -- being manipulated, making an honest mistake, or deliberately taking malicious action. So to defend your organization from any cyber threat, all your users must be ever-vigilant: from your app developers to your accountants, from the CEO to the interns. So how do you build a business-wide culture that values security? How do you not only properly educate users on the threats, but make them care about them? In this

  • Security Management & Analytics
  • Details

U.S. State Protection Laws 2019

by SpirionNov 14, 2019

A great deal of effort was spent this year educating the business and private sector about the 2020 California Consumer Privacy Act (CCPA). However, are you familiar with the 18 other consumer-centric data protection laws that went into effect in 2019? Find out about their nuances like breach notification and data protection requirements in this infographic on US data protection laws.

  • Spirion
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Data Classification for Dummies

by SpirionNov 14, 2019

Download this whitepaper to discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You'll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This whitepaper will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.

  • Spirion
  • Database Security
  • Security Management & Analytics
  • Details

Leverage Existing DLP Investments for Compliance

by SpirionNov 14, 2019

Read this case study to learn how a financial institution integrated Spirion's discovery and classification solution with their existing McAfee DLP to achieve comprehensive PCI compliance

  • Spirion
  • Cybersecurity
  • Database Security
  • Details

The California Consumer Privacy Act: Meet Full Compliance

by SpirionNov 14, 2019

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. Its primary function is to enhance privacy rights and consumer protections for California residents. The CCPA regulates what businesses can and cannot do with personal information they collect. Its considered a landmark legislation on data protection because of its strict guidelines.

This whitepaper provides insight on the new CCPA and how the Spirion data discovery, classification, and protection platform

  • Spirion
  • Security Management & Analytics
  • Database Security
  • Details

Azure Information Protection: Optimized for Risk Management and Data Loss Prevention

by SpirionNov 14, 2019

Many organizations have the Microsoft Azure Information Protection (AIP) platform but are not able to optimize it. With the discovery of all structured and unstructured sensitive data and 2% false-positive rates, an organization can save both time and money. In this case study, find out how a leading pharmaceutical supplier bridged the gap for a unified solution, protecting all sensitive data.

  • Spirion
  • Database Security
  • Cybersecurity
  • Details

How To Become a UC Adoption Rockstar

by FuzeNov 13, 2019

As enterprise migration to Unified Communications as a Service (UCaaS) services grows, user adoption becomes a critical challenge. Without strong adoption, companies miss the opportunity for UCaaS to drive real innovation for their work environments?because it doesn?t have the chance to take root within the organization. Technology decision-makers can buy the most innovative technology on the market and advocate for digital transformation all they want, but if their employees fail to use it,


The Data Torrent

by Dell EMC and AMDNov 13, 2019

Connected devices and the Internet of Things are driving exponential data growth. Over the next few years, the growth will happen at rocket speed. Buried in the rapidly accumulating data are insights that could lead to significant commercial innovation and scientific progress. Download this report to learn more.

  • Dell EMC and AMD
  • Big Data Analytics
  • Software Platforms
  • Details

Unified Communications Security: How Analytics Addresses the Threats You Don’t Even Know About

by Ribbon Communications Inc.Nov 12, 2019

As unified communications (UC) adoption grows, so too does the number of bad actors who prey on vulnerabilities. The source of vulnerabilities stem from a lack of understanding risks and subsequent lack of best practices to address UC security threats. When a serious threat strikes, without the right security solution that can see across the entire UC network -- IT staff will only have reactive after-the-fact options. Wondering what can your organization do, to best protect itself from these bad


Do You Really Know What's Running on Your Network?

by Gigamon Inc.Nov 12, 2019

Everyone thinks they know what applications and data are on their network, but is that really the case?