Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense

by GuardiCoreJul 16, 2019

When an online attacker penetrates your cyber defenses, he or she may take on the guise of an authorized user, making it possible to move laterally within your IT environment to steal information without detection. One growing strategy for limiting this lateral movement is network segmentation, which can restrict access to critical systems and help limit the damage caused by an online attacker. In this Dark Reading webinar, experts discuss methods for using network segmentation and

  • Network & Perimeter Security
  • Details

The Three Phases of a Successful Cloud Migration

by Hitachi VantaraJul 15, 2019

Enterprises everywhere are moving to the cloud to reap the financial, operational and technical benefits. However, their cloud objectives may range from reducing operational costs, increasing agility and improving productivity. To extract value from these cloud initiatives, it is imperative that organizations ensure their cloud projects are well structured and tied to specific outcomes. We consider three phases to be vital to a successful cloud migration.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

Clearing the Path to Cloud

by Hitachi VantaraJul 15, 2019

Read this case study to see how REAN Cloud, now part of Hitachi Vantara, worked with Amazon Web Services (AWS) to create a continuous integration and continuous delivery framework (CI/CD) to migrate Ellucian's portfolio of applications to the cloud.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

Demystify Your Cloud Journey

by Hitachi VantaraJul 15, 2019

View this infographic to identify important business factors as you embark on your cloud journey. Consider your DevOps, compliance, cloud operational efficiency needs and the hybrid and multicloud tools that can get you here.

  • Hitachi Vantara
  • Cloud Services
  • Infrastructure as a Service
  • Details

AI in the Contact Center: Balancing Automation and the Human Touch

by TalkdeskJul 10, 2019

In the customer experience (CX) era, businesses that are able to create an experience that delights become market leaders, while those that fail to do so lag behind and struggle to survive. For most enterprises, CX starts in the contact center, but providing a differentiated customer experience is about more than just having well-trained agents -- it?s about delivering personalized, contextual interactions while reducing the burden on the customer. And doing so while maximizing operational

  • Artificial Intelligence
  • Automation Technology
  • Customer Experience
  • Contact Centers
  • Details

State of the Cloud

by InformationWeekJul 10, 2019

Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. It will examine the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges.
The information submitted is collected by both Informa and our sponsor.

  • InformationWeek
  • Infrastructure as a Service
  • Cloud Services
  • Details

Know Your Enemy. Know Your Risk.

by eSentireJul 08, 2019

This report gets inside the mind of a hacker, analyzing their motivations for penetrating cyber defenses, their methods and the most effective ways to reduce your risk.

  • eSentire
  • Database Security
  • Cybersecurity
  • SMB Security
  • Cloud Security
  • Details

Four Cyber Security Essentials Your Board Wants to Know

by CymulateJul 08, 2019

Explaining your organization's security strategy and controls to a nontechnical audience can be challenging. Aligning that strategy against ever-changing threats and cyberattack techniques is even more challenging. Translating the strategy, threat landscape, and daily impact into meaningful risk metrics has traditionally been nearly impossible.

Yet, executive teams and boards of directors are asking for exactly that. They increasingly demand data that describes the potential impact

  • Cymulate
  • Cybersecurity
  • Security Monitoring
  • Details

Simulation vs. Pentesting vs. Vuln Scanning

by CymulateJul 08, 2019

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning

The most effective way for an organization to test its resilience against the growing wave of cybercrime, is to opt for targeted attack simulations that use multi-vector simulated attacks. These kinds of simulations are also known as Breach & Attack Simulations (BAS). Gartner has asserted that, "Security testing is so challenging for technical professionals focused on security operations that

  • Cymulate
  • Cybersecurity
  • Risk Management/Security
  • Details

IDC SpotLight: Protecting Against Threats with Application Security Testing

by WhiteHat SecurityJul 03, 2019

Application security testing will play a major role in the next generation of security architecture. This IDC Technology Spotlight looks at the role of WhiteHat Security in the marketplace for application security testing solutions.

  • Whitehat Security
  • Cybersecurity
  • Risk Management/Security
  • Details