Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

testwscroma

by UBM TechNov 22, 2019

roma test roma another test


This is a test

by No JitterNov 21, 2019

test


Defeating Advanced Adversaries with Tactical Analytics

by Caendra Inc.Nov 19, 2019

In this webinar, you will see how tactical analytics (the main pillar of SOC 3.0) can be set up and used to greatly enhance an organization's security posture against advanced adversaries. It is a known fact that the traditional reactive defense model is both ineffective and obsolete. The sophisticated techniques, tactics and procedures of modern adversaries necessitate that organizations adopt a proactive defense model and transition to SOC 3.0 operations to be better protected. In this


Building a Security Culture

by VeracodeNov 14, 2019

Most successful cyber security incidents involve a human at your business -- being manipulated, making an honest mistake, or deliberately taking malicious action. So to defend your organization from any cyber threat, all your users must be ever-vigilant: from your app developers to your accountants, from the CEO to the interns. So how do you build a business-wide culture that values security? How do you not only properly educate users on the threats, but make them care about them? In this

  • Security Management & Analytics
  • Details

U.S. State Protection Laws 2019

by SpirionNov 14, 2019

A great deal of effort was spent this year educating the business and private sector about the 2020 California Consumer Privacy Act (CCPA). However, are you familiar with the 18 other consumer-centric data protection laws that went into effect in 2019? Find out about their nuances like breach notification and data protection requirements in this infographic on US data protection laws.

  • Spirion
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Data Classification for Dummies

by SpirionNov 14, 2019

Download this whitepaper to discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You'll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This whitepaper will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.

  • Spirion
  • Database Security
  • Security Management & Analytics
  • Details

Leverage Existing DLP Investments for Compliance

by SpirionNov 14, 2019

Read this case study to learn how a financial institution integrated Spirion's discovery and classification solution with their existing McAfee DLP to achieve comprehensive PCI compliance

  • Spirion
  • Cybersecurity
  • Database Security
  • Details

The California Consumer Privacy Act: Meet Full Compliance

by SpirionNov 14, 2019

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. Its primary function is to enhance privacy rights and consumer protections for California residents. The CCPA regulates what businesses can and cannot do with personal information they collect. Its considered a landmark legislation on data protection because of its strict guidelines.

This whitepaper provides insight on the new CCPA and how the Spirion data discovery, classification, and protection platform

  • Spirion
  • Security Management & Analytics
  • Database Security
  • Details

Azure Information Protection: Optimized for Risk Management and Data Loss Prevention

by SpirionNov 14, 2019

Many organizations have the Microsoft Azure Information Protection (AIP) platform but are not able to optimize it. With the discovery of all structured and unstructured sensitive data and 2% false-positive rates, an organization can save both time and money. In this case study, find out how a leading pharmaceutical supplier bridged the gap for a unified solution, protecting all sensitive data.

  • Spirion
  • Database Security
  • Cybersecurity
  • Details

How To Become a UC Adoption Rockstar

by FuzeNov 13, 2019

As enterprise migration to Unified Communications as a Service (UCaaS) services grows, user adoption becomes a critical challenge. Without strong adoption, companies miss the opportunity for UCaaS to drive real innovation for their work environments?because it doesn?t have the chance to take root within the organization. Technology decision-makers can buy the most innovative technology on the market and advocate for digital transformation all they want, but if their employees fail to use it,