Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Keeping Employees Safe & Informed at the Office—Beyond the Virus

by IntradoApr 21, 2021

As you plan your enterprise?s return to office, it?s not enough to put new cleanliness and distancing measures in place; you?ve got to ensure that employees are safe from workplace violence and other types of emergencies. This isn?t just a nice-to-have; enterprises have a ?duty of care? to make their workplaces as safe as possible. Fortunately, a new generation of messaging and notification technologies can help you provide this enhanced level of safety for your workplace as your


Building Asset Management into Your Enterprise Security Strategy

by Qualys Inc.Apr 21, 2021

A key reason for many enterprise security breaches is that security teams find themselves supporting systems, applications, and devices that they didn?t know they had. Often, attackers exploit these ?blind spots? by introducing devices or code that appears to be legitimate. How can you get a complete picture of your IT assets ? and identify rogue components that might present a threat to your enterprise? In this webinar, experts discuss methods and technologies for gaining a more


The Data-Driven Approach to Understanding Cloud Misconfigurations

by CensysApr 21, 2021

This infographic provides data-driven insights into service exposures amongst 12 cloud providers, that can have severe business consequences in impact areas like: data breaches, malware, ransomware, and services that may leave organizations vulnerable to attacks.

Key findings include: Nearly 2 million database exposures across cloud providers. There are more than 1.9 million RDP exposures across the dozen cloud providers we investigated. Users of OVH were more likely to expose

  • Censys
  • Cloud Security
  • Cloud Infrastructure
  • Cloud
  • Details

Mapping Attack Surface Management to PCI DSS Compliance

by CensysApr 21, 2021

See how the Censys Attack Surface Management (ASM) Platform helps support specific components of PCI DSS version 3.2.1 compliance and how we assist in iterative and systematic risk assessments for PCI DSS compliance.

Download the Guide How the Censys ASM Platform maps to specific PCI DSS version 3.2.1 requirements Features in the Censys ASM Platform that assist in iterative and systematic risk assessments for PCI DSS compliance and beyond. How to put PCI DSS compliance in

  • Censys
  • Risk Management
  • Compliance
  • Cards
  • Details

How a Security Team Automated Remote Employee Scanning & Attack Surface Management

by CensysApr 21, 2021

The State of Indiana LSA didn't have enough resources to keep track of their attack surface. Needing to gain greater visibility into their remote workforce and dealing with a complex cloud migration they began using Censys Home Network Risk Identifier and Attack Surface Management Platform. Gain greater visibility into employees logging in remotely and their impact on the attack surface Automate their risk management processes and save their security team time Track cloud assets over time

  • Censys
  • Security Monitoring
  • Executive Insights & Innovation
  • Security Management & Analytics
  • Details

Insider Threats: An Interactive Crisis Simulation

by Immersive LabsApr 20, 2021

Every day, sensitive enterprise data is compromised by trusted users who, knowingly or accidentally, expose critical information to the outside world. Such compromises can cost your organization dearly in liability, loss of intellectual property, and loss of customer and supplier trust. Do you have the tools, skills, and staffing needed to prevent such a breach? Do you know what steps you must take in the event of a compromise? On April 20, Immersive Labs will offer a unique opportunity to see,


Optimizing App Performance in the Cloud

by StackStateApr 20, 2021

Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly harder to pinpoint issues. During this Network Computing webinar we?ll discuss these issues and more.


Adding Cloud Telephony to Microsoft Teams

by LoopUpApr 20, 2021

Enterprises across the world are switching from traditional on-premises phone systems to cloud-based telephony solutions. The business benefits are hard to ignore — more flexible ways of working, improved employee productivity and reduced operational costs.

A growing number of organizations are using Microsoft Teams for cloud telephony, fully replacing legacy on-premises phone systems. LoopUp's whitepaper "Adding cloud telephony to Microsoft Teams" explains:

  • LoopUp
  • Unified Communications
  • IP Telephony and Unified Communications
  • Details

Five Steps to Perimeter-Less Security: Adopting a Zero-Trust Model

by Duo SecurityApr 16, 2021

Modern security is evolving beyond the perimeter. Users want to access critical work applications from anywhere, at any time and from any device, and the security models to support that must evolve. This eBook dives into the zero-trust security model and outlines five crucial steps you can take to efficiently adopt the zero-trust model within your organization.

  • Duo Security
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details

Gartner: Hype Cycle for Security Operations

by ExtraHopApr 16, 2021

As organizations continue to adopt new IT—from mobile, cloud services, operational technology (OT), and the Internet of Things (IoT)—it's clear that no single security technology provides complete protection, prevention, or visibility. Risk management leaders must make intelligent, business-driven decisions about which operations technologies they choose.

This Gartner whitepaper will help you understand:
• The newest security technologies on the market

  • ExtraHop
  • Security Management & Analytics
  • Risk Management/Security
  • Details