Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Data Center Optics Report

by IHS Markit TechnologySep 19, 2019

Optical networks are evolving to support the insatiable appetite for information driven by the digital transformation of enterprise networks utilizing the cloud, streaming video, and mobile. Several new data rich apps are coming online beginning in 2019 and gaining traction in 2020: 5G upgrades with millions of users demanding high definition content with video anywhere and anytime; autonomous vehicles requiring low latency data flows; distribution of 4K video and 8K VR to consumers; and IoT

  • IHS Markit Technology
  • Big Data Analytics
  • Big Data
  • Details

Security and Intelligence with Ribbon Analytics

by Ribbon Communications Inc.Sep 18, 2019

Consolidate your Network Tools for Real-time Communications Security and Operations.

  • Ribbon Communications Inc.
  • Cybersecurity
  • Risk Management/Security
  • Details

Ribbon NetProtect

by Ribbon Communications Inc.Sep 18, 2019

Security intelligence sharing: A more pragmatic approach to securing your real time communications network

  • Ribbon Communications Inc.
  • Cybersecurity
  • Security Management & Analytics
  • Details

FraudProtect

by Ribbon Communications Inc.Sep 18, 2019

Everyday bad actors are attempting to fraudulently hack communications networks for reasons such as financial gain, denial of services, theft of services, or simply an ideology. In fact, telecommunication fraud loss alone has been estimated at $29 billions in 2017 by the Communications Fraud Control Association (CFCA).

Ribbon FraudProtect is an application that helps identify when fraudulent activity is occurring in your communications network. It monitors calls, identifies unusual or

  • Ribbon Communications Inc.
  • Security platforms
  • Cybersecurity
  • Details

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by Blue HexagonSep 18, 2019

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this enlightening Dark Reading webinar, a top expert will offer some useful definitions of terms, and discuss practical applications that could speed your incident response time and improve your use of IT security staff resources

  • Vulnerabilities & Threats
  • Details

Conquering Toll Fraud with Analytics

by Ribbon Communications Inc.Sep 18, 2019

Telecommunications fraud loss was estimated to be a $29 billion problem in 2017, according to the Communications Fraud Control Association.Don?t be caught off-guard; when your UC infrastructure is compromised, you don?t want to be the executive who didn?t find out about it until after losses mount and your company?s reputation is tarnished.

Whether you know or not, it?s quite likely that bad actors have already tried, or are still trying, to gain access to your unified

  • Analytics
  • Telecom
  • Unified Communications
  • SIP
  • Details

Considerations for Choosing an ATO (Account Takeover) Security Solution

by SpyCloudSep 18, 2019

Account takeover (ATO) isn't slowing down. According to the 2019 Verizon Breach Report, 80% of hacking-related breaches involve the use of weak and stolen credentials. To protect your organization, you need to choose an ATO solution that incorporates multiple modes of defense. In this guide, we share best practices and guidelines for evaluating potential solutions.

  • Spycloud
  • Cybersecurity
  • Risk Management
  • Details

Understanding the Underground Market for Stolen Credentials

by SpyCloudSep 18, 2019

Even after the fall of the large darknet markets, a sophisticated underground ecosystem still thrives on the sale and trade of stolen credentials. Phishing and spear-phishing attacks are becoming increasingly complex—and that's just the tip of the iceberg. In this white paper, SpyCloud experts provide an in-depth analysis of how underground markets operate, how they are changing, and how you can protect yourself and your company.

  • Spycloud
  • Security Monitoring
  • Security
  • Details

Understanding the Latest NIST Password Guidelines

by SpyCloudSep 18, 2019

Over the years, security professionals have learned surprising lessons about how password policies affect user behavior. Faced with complex requirements, people often take dangerous shortcuts.

To help organizations mitigate the risk posed by users' bad password habits, the National Institute of Standards and Technology (NIST) designed a set of password guidelines with human behavior in mind. Read this white paper from SpyCloud to understand what NIST's guidance means for your

  • Spycloud
  • Cybersecurity
  • Risk Management/Security
  • Details

Password Remediation Playbook

by SpyCloudSep 18, 2019

What should you do if your employee's password is exposed in a breach? If you're in this position, you need to take action right away to protect your enterprise. Criminals actively exploit stolen login information to take over accounts, drain funds, and infiltrate corporate networks. In this guide, learn the 5 steps you should take to remediate an exposed account.

  • Spycloud
  • Cybersecurity
  • Risk Management
  • Details