Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Search Results:

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:










eBook: Power Management 101: A quick guide to getting the most out of your hardware

by EatonApr 01, 2020

This handbook covers the basics of connectivity including network cards, cybersecurity, remote monitoring and tips for selecting a power management solution. If you want to better understand why monitoring and managing your power infrastructure is important or just want to gather some ammunition to convince your boss of this, enjoy the visual guides, FAQs, best practices and questions to consider included in this guide.


eBook: UPS Fundamentals Handbook

by EatonApr 01, 2020

From plug and receptacle charts and facts about power problems to an overview of various UPS topologies and factors affecting battery life, you'll find a wealth of pertinent resources designed to help you develop the optimum solution. This handbook is your one-stop source for essential information ... whether you need power protection for small, medium or large data centers; health care facilities; or other environments in which ensuring uptime and safeguarding data are critical.


eBook: Quick Guide to Power Distribution

by EatonApr 01, 2020

Rack power distribution units, A.K.A. rack PDUs, are a key component to any IT environment. The right unit can allow you to monitor and control the power at the individual outlet, switch power on and off, remotely shut down the power during an emergency power outage, or simply distribute power efficiently and safely. Learn more about rack PDUs and the modern benefits they can have for your business.


eBook: Disaster Recovery Checklist

by EatonApr 01, 2020

Disaster can strike at a moment's notice. Whether it's an everyday power outage or calamitous weather event, you need a recovery plan at the ready. Included are specifics on IT inventory assessments, network structures and diagrams, back up data procedures and more. Based on this thorough guide, you will be able to assess your current disaster recovery plan or build one from scratch.


Research Report: 2020 State of Enterprise IT Report

by InformationWeekMar 31, 2020

Digital Transformation Shapes IT Trends

The pace of innovation continues to accelerate as organizations become increasingly digital. IT investment, cloud computing, AI and analytics, along with a renewed focus on customers and business partners, are helping IT secure its strategic position in organizations. IT leaders aren't just considering but are implementing emerging technologies and concepts such as new cloud computing uses, a shift to analytics-driven decision making, and


Whitepaper: A Market Guide to Simulation-Based Cybersecurity Training

by RangeForceMar 30, 2020

Learn why on-demand simulation-based cybersecurity training is essential for security teams in today's threat environment. This white paper defines the simulation-based training market, its training value, and its advantages to security leaders and security team members.

Download this whitepaper to learn about the on-demand simulation training market, including: What the cybersecurity on-demand simulation-based training market is and why it is important. The capabilities of these


Research Report: Osterman Research-Nation-State Attack Survey: Top CISO Concerns

by AnomaliMar 27, 2020

The Situation Between the United States and Iran is Influencing CISO's Security Strategy and Operations.

Nation-state attacks--in which military of non-military government entities seek to infiltrate other governments, enterprises, or non-commercial organizations--are on the rise. For example, Microsoft revealed in mid-2019 that 8,000 of its enterprise customers had been targeted by these types of attacks during the previous twelve months.

Nation-state attacks are


Research Report: SANS 2020 Cyber Threat Intelligence Survey Results

by AnomaliMar 27, 2020

The Maturation of Cyber Threat Intelligence (CTI)

This year's survey had a record number of respondents (1,006) and the highest ever reporting of Cyber Threat Intelligence (CTI) programs within organizations. 2020 showed 80% of respondents reporting that they produce or consume CTI, an increase of 10% to last year.

As the field reaches maturity, understanding and improving the effectiveness of CTI programs will become more critical. This paper focuses on why finding the


Research Report: Global Cloud Proxy Enables VPN Split Tunneling

by Menlo SecurityMar 26, 2020

Coupled with VPN split tunneling, the Menlo Security Global Cloud Proxy with an Isolation Core™ ensures that security policies are applied to all traffic without overwhelming bandwidth and capacity. To learn more, view this brief.


Webcast: The ROI Story

by NutanixMar 25, 2020

Disruptive technology such as hyper-converged infrastructure tends to significantly complicate the buying decision. It forces new operational procedures and can impact IT governance, security, and compliance. But even a strong financial justification might not be enough to alter the ingrained processes, interests, and cultural norms surrounding the legacy environment. In many cases, it takes an ROI story. This webinar will assist anyone interested in how to use financial analysis as a framework