Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Microsoft Teams Voice Enabled Customer Service Workflows

by NetrixJul 28, 2021

Many organizations have incorporated Microsoft Teams to enable hybrid work where in-office and remote employees regularly collaborate. However, there are enormous benefits to the customer service experience when organizations integrate Teams Direct Routing and their contact center into the Teams Voice platform. With such integrations companies can: integrate SMS into Teams chat channels, initiate call-backs from SMS messages with links to mobile Teams clients, bump the SMS directly into a Teams


Using Cyber Underground & Blockchain Intel to Stop Cyber Attacks

by Intel 471Jul 28, 2021

Pair Intel 471?s incredibly powerful intelligence about the thriving cyber underground economy with visualized blockchain forensics to predict and prevent cybercrime. Chainalysis enables investigators to identify and monitor threat actors' cryptocurrency wallets for notification of TTP changes and attack preparation at the point of sale. Following the money can also lead to attribution of these criminal networks and expand insight into the underlying supply chain that can sometimes be missed


The Top 10 Threats of Data Sprawl and How to Mitigate Them

by DaseraJul 28, 2021

Data sprawl is a massive problem. Traditional tools like access control and DLP are powerless in today's cloud environments, compounding data security and compliance risks. To manage these risks, enterprises need an innovative way to secure their data. Get this ebook to learn how.

  • Dasera
  • Cloud Security
  • Database Security
  • Security platforms
  • Details

The 7 Deadly Sins of Access Control, and How to Avoid Them

by DaseraJul 28, 2021

Today, access control is the default approach to protecting sensitive data. It promises to improve security, but in reality, breaches still occur. And that's because access controls aren't designed to address modern security challenges. Learn how to tackle data security in a more effective way.

  • Dasera
  • Cloud Security
  • Database Security
  • Security platforms
  • Details

How Securing the Data Lifecycle Can Transform Your Data Protection Program

by DaseraJul 28, 2021

Companies spend millions of dollars out of pocket on data security solutions, yet breaches still happen everyday. And that's because traditional solutions aren't built for today's cloud workloads. Data has a life of its own -- the data lifecycle. When it is used, it flows through multiple touchpoints, all of which introduce new security and compliance vulnerabilities at each stage. Learn how to dramatically improve your data security and compliance posture by securing your data lifecycle.

  • Dasera
  • Cloud Security
  • Database Security
  • Security platforms
  • Details

The Top 5 Fails of DLP

by DaseraJul 28, 2021

Data Loss Prevention (DLP) is a cornerstone of today's security infrastructure. Yet, data breaches still occur on a daily basis. Many companies with DLP solutions have come to the same conclusion when it comes to protecting their sensitive data: it just doesn't work. Learn why DLP is no longer sufficient in today's security landscape and how you can go beyond DLP to protect data in cloud-first environments.

  • Dasera
  • Cloud Security
  • Database Security
  • Security platforms
  • Details

The Dirty Dozen: The Truth About Privacy Preserving Techniques and Technologies

by DaseraJul 28, 2021

Any organization that collects sensitive information is subject to privacy regulations. Yet, most companies struggle to determine which techniques and technologies can best protect and preserve the privacy of their data. We've done the research for you. Discover the shortcomings -- or dirty little secrets -- of each technology and learn how you can truly protect the privacy of your sensitive data.

  • Dasera
  • Risk Management/Security
  • Database Security
  • Risk Management
  • Details

Unifying Your Enterprise’s Endpoint Security Strategy

by Deep InstinctJul 27, 2021

For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain a security strategy that protects enterprise data and users across such a wide variety of devices and locations. In this Dark Reading webinar, top experts discuss strategies and tools for unifying endpoint security policies and practices,


Top 10 Risk & Compliance Trends for 2021

by Navex GlobalJul 27, 2021

The events of 2020 have placed new priorities and responsibilities on the shoulders of risk and compliance professionals. However, it also created highly visible opportunities for our industry's professionals to lead their organizations confidently into 2021. In our annual Risk & Compliance Trends report for 2021, we explore how to develop a holistic approach to risk management by integrating your organization's compliance, IT, operational, reputational, third–party, and ESG

  • Navex Global
  • Risk Management
  • Risk Management/Security
  • Details

Major University with Diverse Requirements Automates Information Security

by Navex GlobalJul 27, 2021

Major University Biological Sciences Division uses Lockpath to address vulnerability management while embracing the university's decentralized structure and open culture. By prioritizing vulnerabilities, defining roles and mapping steps taken, the division was able to take advantage of Lockpath's ability to streamline and automate processes. It greatly reduced the response time for addressing vulnerabilities.

  • Navex Global
  • Cybersecurity
  • Risk Management/Security
  • Details