Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Get Continuous Visibility to Active Directory Exposures and Live Attacks

by Attivo NetworksApr 23, 2021

Active Directory is a Microsoft product consisting of several services to administer permissions and access to networked resources on a Windows Network. Because it's the primary source of information for all enterprise resources and seamlessly integrates business applications, it's a high-value target for attackers.

Download this report to find out how you can achieve ongoing visibility into critical domain, computer, and user-level exposures and monitoring of Active Directory for

  • Attivo Networks
  • Risk Management/Security
  • Security Monitoring
  • Details

Build an Active Defense Strategy with MITRE Shield and Deception Technology

by Attivo NetworksApr 23, 2021

The MITRE Shield matrix lists capabilities that help an enterprise to change an attack engagement from a defensive play to an offensive play. These range from basic defensive capabilities to cyber deception and adversary engagement operations. In this paper, Attivo evaluates the ThreatDefend® platform against all Active Defense techniques and use cases documented per technique by the MITRE Shield knowledge base to illustrate its comprehensive coverage.

  • Attivo Networks
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Cybersecurity Risk Management

by InformationWeekApr 22, 2021

The shared responsibility model of cloud computing means companies are responsible for securing their cloud-based data, apps and infrastructure. But since not every workload demands the highest level of security, how do you balance risk tolerance and cost? This virtual trade show will highlight the latest strategies, tools and research to help you develop the right cybersecurity risk strategy for your business.

  • Cybersecurity
  • Risk Management/Security
  • Details

Legal Team’s Role in Investigating and Responding to a Data Breach

by Access DataApr 22, 2021

This white paper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage—from the initial identification and investigation, through reporting findings and learning from the incident.

Download this paper to learn where Legal fits in the following categories: Planning for incident response Responding to a breach The post-breach response and investigation

  • Access Data
  • Cybersecurity
  • Risk Management/Security
  • Enterprise
  • Details

5 Tips for Partnering With Your IT Security Team

by Access DataApr 22, 2021

The way we work has changed. Endpoints are no longer located in a physical office and users are working from home, and often not connected to the VPN or company network. It's crucial that IT security teams are supported and empowered.

Download this white paper to learn some ideas to keep your IT security team motivated in these challenging times.

These include: Create an environment of trust Promote autonomy Foster career growth Positive reinforcement Providing the right

  • Access Data
  • Team Building & Staffing
  • Cybersecurity
  • Executive Insights & Innovation
  • Risk Management
  • Details

Preparing Your Corporate Network for Microsoft Teams Telephony

by LoopUpApr 22, 2021

Microsoft Teams is highly regarded as a tool for both collaboration and communication. But in order for organizations to get the most out of Teams, their corporate network infrastructure must be set up appropriately.

Our whitepaper "Preparing your corporate network for Microsoft Teams telephony" explains:

• How network issues can affect call quality
• Why the quality of the corporate network is just as important as the quantity of network capacity

  • LoopUp
  • Unified Communications
  • IP Telephony and Unified Communications
  • Details

Direct Routing or Calling Plans — Which Approach to Microsoft Teams Telephony is Right for Your Business?

by LoopUpApr 22, 2021

The use of Teams as a full telephony replacement solution is gaining traction, but organizations are not always aware of the options available to them for connecting Microsoft Phone System to the public network.

Our whitepaper "Direct Routing or Calling Plans: which approach to Microsoft Teams telephony is right for your business?" explains:

• What is Microsoft Phone System and how does it work?
• Microsoft Calling Plans — a simple approach for

  • LoopUp
  • IP Telephony and Unified Communications
  • Unified Communications
  • Details

The Microsoft Teams Telephony User Experience

by LoopUpApr 22, 2021

If you're considering incorporating enterprise telephony into Microsoft Teams, you're doubtless already aware of the benefits it can deliver to your business. But what is Teams telephony actually like to use?

Our in-depth guide takes you through the key features and functions of Microsoft Teams telephony, including:

• The basics of making and receiving calls
• Setting up auto-attendants and call queues
• Delegating or redirecting incoming calls

  • LoopUp
  • IP Telephony and Unified Communications
  • Unified Communications
  • Details

Keeping Employees Safe & Informed at the Office—Beyond the Virus

by IntradoApr 21, 2021

As you plan your enterprise?s return to office, it?s not enough to put new cleanliness and distancing measures in place; you?ve got to ensure that employees are safe from workplace violence and other types of emergencies. This isn?t just a nice-to-have; enterprises have a ?duty of care? to make their workplaces as safe as possible. Fortunately, a new generation of messaging and notification technologies can help you provide this enhanced level of safety for your workplace as your


Building Asset Management into Your Enterprise Security Strategy

by Qualys Inc.Apr 21, 2021

A key reason for many enterprise security breaches is that security teams find themselves supporting systems, applications, and devices that they didn?t know they had. Often, attackers exploit these ?blind spots? by introducing devices or code that appears to be legitimate. How can you get a complete picture of your IT assets ? and identify rogue components that might present a threat to your enterprise? In this webinar, experts discuss methods and technologies for gaining a more