Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Finding an Access Solution

by LogMeInFeb 24, 2020

So, you've decided your business could benefit from an access solution. Now what? To help, we've crafted a comprehensive guide to walk you through evaluating and comparing access solutions. Download the free guide to learn: Core components of an effective access solution Key problems an access solution should address A comprehensive set of criteria for evaluating solutions Best practices for implementing an access solution


Identity 101 for Businesses

by LogMeInFeb 24, 2020

What is identity, and what do you need to know about investing in a solution? To help, we've crafted an introductory guide to explain key concepts around identity and access management, so you can feel more confident when you're ready to explore or trial an identity solution.
Download the free guide to learn: why identity matters How an identity solution addresses key challenges The benefits you can expect from an identity solution Overviews of Single Sign-On, Enterprise Password


Global Password Security Report

by LogMeInFeb 24, 2020

LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The takeaway is clear: Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business' ability to achieve high standards of security. Download the free report today to see the current state of password security, access, and authentication — and learn what you can do today to better secure your company.


SMB's Guide to Modern Identity

by LogMeInFeb 24, 2020

LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity today. We surveyed 700 IT and security professionals at organizations ranging from 250-2,999 employees across a range of industries and countries.
Download this guide to: Learn about various identity technologies Understand the challenges, risks, & priorities for managing identity in the modern workplace Gain clarity and actionable steps to further improve your organizations IAM


IT Careers: Tech Drives Constant Change

by InformationWeekFeb 12, 2020

Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. Tech concepts such as outsourcing, artificial intelligence and machine learning, data analytics, cloud, and DevOps are changing the game for every IT pro.

In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market, including: In-demand skills Where to go for advice on


Building an Incident Readiness and Response Playbook

by CiscoJan 14, 2020

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident


6 Emerging Cyber Threats That Enterprises Face in 2020

by Dark ReadingFeb 04, 2020

Enterprise organizations will face a combination of traditional and nontraditional cyber threats in 2020. Many of the threats that plagued organizations in the past will remain potent. But attackers leveraging artificial intelligence (AI) and machine learning (ML) tools will give IT security professionals plenty of new challenges to deal with in 2020 and the years ahead.

This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020.


Linking, Orchestrating, and Managing Your Enterprise Security Systems

by ReliaQuest LLCJan 06, 2020

Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense.


Apex Report: Global Cyber Infection

by PrevailionFeb 04, 2020

Prevailion's Apex Report demonstrates a unique perspective into the top compromised industries across the globe during Q4 2019. The report's findings are based on our Apex Compromise Intelligence platform, powered by 1 billion malicious beacons collected daily from thousands of malware/APT infected organizations in over 99 industry sub-sectors. The vantage point Apex provides into compromises allows our team of experts to weigh in on trends we are seeing across top industries across the globe.


Next Generation Cyber Risk Management

by PrevailionFeb 04, 2020

To survive today, businesses need visibility into the threats trying to subvert their networks. Without it, they are blindly fending off attacks in the darkness against adversaries capable of laser targeting their vulnerabilities. What if you could augment your perception of those enemies This report covers the challenges around managing third-party data risk that have accumulated into a global mess and what the alternatives are to effective governance today.


SUBTOPICS:

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


LogMeIn

LogMeIn is a leading provider of on-demand, remote-connectivity and support solutions to small businesses, IT service providers and consumers. Businesses and IT service providers use LogMeIn's solutions to deliver remote end-user support and to access and manage computers and other Internet-enabled devices more effectively and efficiently. Consumers and mobile workers use our solutions to access computer resources remotely, thereby facilitating their mobility and increasing their productivity. Our solutions, which are deployed on-demand and accessible through a Web browser, are secure, scalable and easy for our customers to try, purchase and use. Since our inception, our users have connected over 50 million computers and other Internet-enabled devices to a LogMeIn service.


Prevailion

Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.