Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Infrastructure

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







From Scan to Fix, the Best Free Vulnerability Management Tools

by Vulcan CyberAug 12, 2020

With so many new vulnerabilities to manage and fix, and an almost equally large number of vulnerability management tools available to security and IT operations teams, important, actionable remediation intelligence often gets lost in the fray.

Read this whitepaper to learn: Which free, open source tools can provide value to your vulnerability management program? When open source tools can effectively replace expensive, commercial alternatives. How to identify the right database for


A Business Case for Vulnerability Remediation Orchestration

by Vulcan CyberFeb 26, 2021

The business case for vulnerability remediation orchestration is a no brainer. You know it...we know it. Now get this paper and make copies in triplicate for your CEO, CISO and CIO to get them Description: From the moment the team scans for vulnerabilities, the rest of the remediation effort becomes tedious and uncertain with no guarantee fix will get done.

The growing scale of digital infrastructure and the complexity of IT security programs has resulted in unacceptable


iPaaS Intrigue: A Faster Path to Digital Transformation

by TeamDynamixFeb 26, 2021

In light of recent events, companies everywhere have put digital modernization on the fast track. It's critical now that companies invest in enterprise integration and workflow solutions – the fundamental building blocks of digital transformation.

Read "iPaaS Intrigue: A Faster Path to Digital Transformation" to learn:
• Why integration and workflows are key to scaling and modernizing your digital ecosystem.
• How to simplify technology modernization with


High Performance Applications with the Dominion KX III

by RaritanFeb 18, 2021

Broadcast, control room, government, military and other users of high performance applications face several challenges when it comes to remote access and control. They require ultra-fast switching, high definition video, low latency, and support for dual video and monitors. In addition, IT, engineering, and other departments also require 24/7 access to these computers to make sure if something does go wrong, it can be fixed quickly.

Learn more here.


How a Trading Floor Continues its Operations During COVID-19 Lockdown

by RaritanFeb 18, 2021

When the pandemic hit the world and people were forced to stay at home in order to stay safe and minimize the number of casualties, a major bank faced serious dilemmas on how to let its floor traders continue their work.

Read how Raritan was able to help.


MontanaPBS Shifts to Agile Broadcasting with Help from Raritan KVM Solutions

by RaritanFeb 18, 2021

PBS Television Station Improves Content Delivery

When the award-winning Public Broadcasting Service affiliate in Bozeman, Montana, moved to a new software-defined broadcast system, it turned to Raritan for tools for easier access to the new system and for managing the stations IT infrastructure. "Uniform and reliable access to systems and ease of use" make the KX III switch and User Station a winning combination. Broadcast operations, Engineering, and IT personnel now have anytime -


Accelerate Threat Resolution with DNS

by InfobloxFeb 03, 2021

All things networking start with DNS. It's the foundational element that identifies what's on the network. And it's also a leading indicator of threat activity and network vulnerability.

In this study you'll learn: How DNS fills gaps left by other security tools How threat detection automation reduces attack dwell times What deep insights DNS provides in threat investigation What challenges security leaders can solve with DNS


Supercharge Incident Response with DDI Visibility

by InfobloxFeb 03, 2021

Flaws in Incident Response do not necessarily mean the team is doing a poor job. The team may lack timely access to the data it needs to do its job effectively.

In this whitepaper you'll learn how correlated DNS data enables security teams to trace—in real time via DHCP and IPAM and: Enhance Visibility and Asset Identification Enhance the Six-Step Incident Response Process


The Global Quest for Sustainable Work-From-Anywhere Security

by InfobloxFeb 03, 2021

Read this study to learn how endpoint security has evolved over the past 12 to 18 months and how this is shaping the future of security. Understand the long-term shifts in security strategies that are being undertaken to keep pace with the work-from-anywhere transformation.

In this report you'll learn: Work from anywhere is here to stay The shift to cloud security has accelerated VPN's problems were exposed and alternatives are being considered


2021 SANS Cyber Threat Intelligence Survey

by InfobloxFeb 03, 2021

The COVID-19 pandemic has reordered business priorities in countless ways. But the most far-reaching consequence just might be the overwhelming shift in the number of organizations placing greater priority on cybersecurity. CTI has become ubiquitous now, but there is still work to be done.

In this report you'll learn: CTI has matured into a field where more and more organizations understand that the benefits are worth the investment Tools and processes are becoming more automated,


SUBTOPICS:

Infoblox

Over the past 20 years, we've been recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. Building upon this proven foundation, we're bringing DDI and core network services to the next level with our Secure Cloud-Managed Network Services. This enables all customers to go to the next level that's right for them—whether their networks are completely on-premises, full cloud or hybrid cloud.


Raritan

Raritan, a brand of Legrand, is a global leader in intelligent rack PDUs, KVM switches, and other data center infrastructure monitoring and management solutions. Raritan's innovations improve the reliability, efficiency, and intelligence of data centers and server rooms around the globe — including those of the top Fortune 500 companies, such as Cisco, Dell, HP, IBM, Intel, and Microsoft.


TeamDynamix

Work better together. Our philosophy is that technology should be easy to use, own, and operate — so we put IT Service Management (ITSM), Project Portfolio Management (PMM), and Enterprise Service Management (ESM) together — on one, simple, codeless platform. From there, we focused on enterprise connectivity and workflow by delivering iPaaS with ITPA. Life is complicated enough... we make it easier. More at TeamDynamix.com, @TDXBuzz, LinkedIn.


Vulcan Cyber

Vulcan Cyber has developed the industry's first vulnerability remediation platform, built to help cybersecurity and IT operations teams collaboratively secure digital business. The Vulcan SaaS platform closes the gap between detection and remediation to reduce vulnerability dwell time and associated business risk. Vulcan Cyber orchestrates the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. It's unique ability to "get fix done" has garnered Vulcan Cyber recognition as a 2019 Gartner Cool Vendor and an RSAC Innovation Sandbox 2020 finalist. Based in Tel Aviv and San Francisco, Vulcan Cyber is privately funded by cybersecurity specialists YL Ventures and TenEleven Ventures.