Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

ZTNA vs On-Premises Firewall VPN: A Detailed Comparison

by Perimeter 81Aug 17, 2022

The new shift to remote work has entirely changed the way access to cloud resources have been given. Firewall VPNs of yesterday simply cannot keep pace with the dynamic remote landscape of today. How can you keep your network and remote workforce safe from external attacks beyond the physical office perimeter? The solution? Zero Trust Network Access (ZTNA). Don't leave your network security unattended. Get your ZTNA vs Firewall VPN Essential Guide and discover:  5 main limitations of a

  • Perimeter 81
  • Cybersecurity
  • Network & Perimeter Security
  • Details

Zombie SIEM: Dead but Lingering – and Eating Your Brain

by ActZeroOct 25, 2021

This white paper argues that SIEM systems are increasingly obsolete, despite remaining a standard platform for many Security Operations Centers (SOCs) today. While SIEM can provide a useful centralization of security information, in many ways these technologies now hamper cybersecurity efforts more than they help. In short, SIEMs are expensive and unwieldy. The paper details how the technology can lead to ballooning costs, and why SIEM platforms frequently leave security teams paralyzed in

  • ActZero
  • Cybersecurity
  • Endpoint Security
  • Details

Zero Trust with HP Wolf Enterprise Security

by HP Enterprise SecuritySep 02, 2021

The concept of zero trust was coined a decade ago and has steadily and legitimately evolved to enter the modern enterprise IT security architecture. In this document, HP presents an overview of zero trust and discusses how HP furthers this concept for PC endpoints.

  • Security
  • Security Monitoring
  • Details

Zero Trust Journey + Approach Infographic

by Optiv | Palo Alto NetworksJun 09, 2021

Expansion of traditional workforce, ubiquity of security threats, and an accelerated digital transformation journey have resulted in a paradigm shift, forever changing the traditional view of 'trusted network', giving rise to the concept of Zero Trust architecture. The evolving ecosystem warrants a paradigm shift in the way organizations approach the design and implementation of business processes and technical capabilities, aligning them with the "Zero Trust" model.

This infographic

  • Security Management & Analytics
  • Security
  • Optiv | Palo Alto Networks
  • Details

Zero Trust in Real Life

by Dark ReadingNov 02, 2021

With a growing number of attacks targeting credentials and identity technology, organizations are increasingly looking at the zero-trust security model to protect their network, employees, and data. Despite the buzz around zero-trust, many organizations are still in the early stages of deployments and figuring out how to get the most out of this security architecture. Zero-trust is not a set-and-forget security strategy. In this special report, learn how to think about redundancy and layered

  • Dark Reading
  • Network & Perimeter Security
  • Networking
  • Endpoint Security
  • Cloud Security
  • Applications
  • Details

Zero Trust Guiding Principles

by Optiv | Palo Alto NetworksJun 09, 2021

We are in the midst of a massive paradigm shift in security deployment — one that goes beyond defense-in-depth.

Zero Trust builds on the concepts of "don't trust anyone" (least privilege), "divide and conquer" (network segmentation) and "who-are-you-where-are-you-and-what-are-you-accessing" (risk-based) access. And your new perimeter? It's Identity. And it can strengthen network, application and data protection.

Dive deep into this and more. Optiv's Field Guide #6:

  • Risk Management
  • Security Management & Analytics
  • Optiv | Palo Alto Networks
  • Details

Zero Trust Evaluation Guide

by Duo SecurityJan 20, 2021

Can you verify your users are who they say they are? Do you have detailed insight into every type of device accessing your applications, across every platform? It can be overwhelming to know where to start on your zero trust journey and what questions to ask. This guide explores these questions and can help you evaluate different solutions, along with what requirements your zero-trust platform should have to support a modern organization.

  • Duo Security
  • Network & Perimeter Security
  • Security platforms
  • Details

Zero Trust and the Power of Isolation for Threat Prevention

by Menlo SecurityJul 06, 2021

Online threats are on the rise, with 86% of organizations having a successful cyberattack landed on them by the start of 2021.

Legacy detect-and-remediate approaches have long been the cybersecurity standard, but savvy threat actors easily poke holes in that strategy and attack rates continue to grow. Flawed approaches coupled with legacy technology is turning into quite the nightmare for security departments, especially during a time where the COVID-19 pandemic has increased cloud

  • Menlo Security
  • Cybersecurity
  • Cloud Security
  • Details

Zero Trust and the Challenge of Device Security

by InfinipointMay 02, 2022

68% of Security professionals plan to use Zero Trust for devices. But applying Zero Trust principals to devices is difficult to achieve.

Why? Our survey of 388 IT Security professionals cites support issues, administrative burden, disruption to end-user access and lack of remediation options as the top obstacles.

Read Zero Trust and the Challenge of Device Security to learn: How your peers view Zero Trust and device security The biggest challenges in implementing

  • Infinipoint
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

Zero Trust Access for Dummies. Never trust. Always verify.

by FortinetSep 18, 2022

Zero trust can be a confusing term due to how it applies across many technologies. However, it does not need to be. This short book clarifies in simple terms what you need to know about Zero Trust Access (ZTA).

Get your copy of the comprehensive zero trust access eBook, that: Defines zero trust in terms anyone can understand Spells out the benefits of zero trust access Shows the tenets of keeping privileged access secure Plus, the challenges, solutions, and business

  • Fortinet
  • Cybersecurity
  • Security
  • Details