Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Infrastructure

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How an Intelligent Network Can Unburden IT Teams

by FortinetFeb 17, 2022

Today's networks are expected to do more than deliver connectivity and bandwidth. To optimize performance and enable additional functionality, a network needs to be intelligent. The more intelligent the network, the better it will perform, and the more tasks it can offload from IT teams.

Read this Checklist to find out the five important ways that intelligence can be built into the network to make things easier on those running it.


Ensure a Secure LAN Edge for All Devices

by FortinetFeb 17, 2022

With 70% of workers still using personal devices for work and IoT proving to be even more challenging, with headless devices that have limited to no security functionality, Network access control (NAC) solutions can ensure only devices that should attach to the network do, and can restrict what they have access to.

Download this eBook to find out how having basic NAC services baked into a local-area network (LAN) edge solution for simplicity and consistent security policy.


Infographic: 10 Reasons Why Industrial Organizations Need Better Asset Visibility

by DragosMay 10, 2022

A key defense against increasing industrial cyber threats is to fully identify and inventory all your operational technology (OT) assets, including communication pathways. Every cybersecurity process becomes easier and more effective, when you have good asset visibility.

Download this infographic now to discover the 10 reasons why industrial organizations need better asset visibility.


Elevating App Visibility to Prevent Future Headaches

by SALT SecurityApr 29, 2022

Increasingly complex applications tend to create blind spots that cause pain for IT teams when they least expect it. If attackers exploit a critical flaw in an application that you didn?t even know that your organization was using, it might be a very bad day for you. If your network traffic is clogged up because of a bottleneck you can?t locate, that?s a frustrating problem to solve. However, with the right processes and tools in place, IT teams can get a clearer picture of their


Executive Summary: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 10, 2022

In 2021, the industrial community attracted high-profile attention. Major cybersecurity incidents struck industrial organizations in a range of sectors, with international headlines detailing everything from a compromise of a water treatment facility with intent to poison its community to a ransomware attack against a pipeline operator that disrupted gas supplies to the southeast United States.

These reports underscored the potential devastating outcomes a security breach of critical


Report: An Executive's Guide to Industrial Cybersecurity

by DragosMay 10, 2022

As enterprises invest heavily in digital transformation, industrial cybersecurity will increasingly serve as a critical enabler for safely and securely advancing business goals through technological innovation.

Advancing connectivity and digitalization of operational technology (OT) provides significant benefits to the business, including: Increased automation Improved process efficiency Better asset utilization Enhanced telemetry of machinery for business forecasting


Whitepaper: PIPEDREAM: Chernovite’s Emerging Malware Targeting Industrial Control Systems

by DragosMay 10, 2022

Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become public, the better the effects of any attempted attacks can be reduced.

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth


Whitepaper: How Dragos Activity Groups Obtain Initial Access into Industrial Environments

by DragosMay 10, 2022

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access Tactic.

Initial access is one of the most important adversarial tactics and may form the critical dependency on which further tactics rely, or conversely it may be the end goal


Architecting and Managing Hybrid and Cloudbased Identity Services

by Radiant LogicApr 25, 2022

One of the world's leading providers of entertainment and information had acquired multiple smaller companies that made up a comprehensive portfolio of brands and subsidiaries—each with its own identity infrastructure, creating an identity management challenge because each subsidiary needed to access shared services such as the corporate network, email, HR apps, etc. To address this challenge, the corporation created an initiative called One Identity.

Learn how they achieved:


The “One Identity” Initiative

by Radiant LogicApr 25, 2022

Over the past 10+ years, much of IT has moved to the cloud including IAM, Customer IAM, and Privileged access management. Enterprises are facing mixed identity infrastructures with the added complexity of multiple IDaaS solutions. TechVision Research has recently released a new report on how to thrive in a hybrid environment which includes: IAM Reference Architecture Considering Hybrid/IDaaS Capabilities of the Hybrid/IDaaS Functional and Technical Landscape Risk Management & IAM


SUBTOPICS:

Dragos

Dragos is the industrial cybersecurity expert on a relentless mission to safeguard civilization. In a world of rising cybersecurity threats, Dragos protects the most critical infrastructure (those that provide us with the tenets of modern civilization) from increasingly capable adversaries. Devoted to codifying and sharing our in-depth industry knowledge of ICS/OT systems, Dragos arms industrial defenders around the world with the knowledge and tools to protect their systems as effectively and efficiently as possible.


Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 290,000 customers trust Fortinet to protect their businesses. Learn more at https://www.fortinet.com.


Radiant Logic

Radiant Logic, the enterprise Identity Data Fabric company, provides the cornerstone of complex identity architectures in today's digital world. With Radiant, it's fast and easy to put identity data to work, connecting many disparate data sources across legacy and cloud infrastructures in real-time, without disruption. Their solution creates a solid identity foundation that speeds the success of initiatives, including single sign-on, M&A integrations, identity governance and administration, cloud directory deployments, hybrid and multi-cloud environments, customer identity and access management, and more. From the Fortune 1000 to government agencies, organizations across the globe rely on Radiant to deliver meaningfully faster time-to-value and unprecedented IT agility, while building a secure, future-proof identity infrastructure that meets real-world business demands.