Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Infrastructure

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Why Chatbots Are So Popular Right Now

by InformationWeekOct 28, 2020

Enterprise organizations had already embraced the idea of chatbots before the pandemic. They are the top use case for artificial intelligence, and depending on implementation, an easy way for organizations to get started with AI. Enterprises have deployed chatbots in a range of use cases from IT help desk to human resources to sales to customer service.

In 2020, it's no surprise that organizations have increased their reliance on chatbots to help support operations as the COVID-19


Redefining the Enterprise Security Perimeter

by Ribbon Communications Inc.Jan 14, 2020

Attacks on voice over IP (VoIP) traffic continues to increase and these new VoIP attacks are costing service providers and enterprises billions of dollars each year in toll fraud, theft of service, ransomware payments and more. The market now demands a unified security perimeter that combines the capabilities of next generation firewalls with the capabilities of best-in-class session border controllers. Only by unifying the visibility and policy enforcement across voice and data domains can you


Ribbon Analytics: Fraud protect

by Ribbon Communications Inc.Oct 26, 2020

Unified Communications fraud continues to cost carriers and enterprises tens of billions of dollars per year. Bad actors typically commit telecom fraud for financial gains. In order to meet their objectives, bad actors often cover a broad set of call scenarios — from IP-PBX hacking, to subscription fraud, to Wangiri (one ring and cut) and other use cases. FraudProtect analytics application provides you with the insight and tools needed to identify and stop the UC fraud in your network.


Ribbon Analytics: Application Portfolio

by Ribbon Communications Inc.Oct 26, 2020

The Ribbon Analytics application portfolio consists of Operations, Security and Monetization solutions that deliver numerous use cases for services assurance, security and subscriber growth. Powered by Ribbon Protect, a big data analytics platform, you can grow your investment with numerous out of the box applications to speed up deployments and provide a significant return on investment. This suite of applications enable you to secure your RTC network, monetize subscriber data with third


Ribbon Analytics - TDoSProtect

by Ribbon Communications Inc.Oct 26, 2020

Telephone Denial-of-Service (TDoS) attacks are increasing every day. They are often part of an extortion scheme where a bad actor demands payment, then launches a continuous stream of phantom calls that block normal calls in your business until payment is received. Usually, the attacks start and stop randomly until the ransom is paid. Frequent targets include hospitals, government offices and public-safety answering point offices. Ribbon Analytics TDoSProtect application uses granular tracking


The State of Cloud Computing - Fall 2020

by InformationWeekOct 23, 2020

As businesses scrambled to adapt to the unprecedented level of disruption due to the COVID-19 pandemic, it became clear that the increased use of cloud resources was the key to maintaining business operations. Businesses must be more digital than ever just to survive. Although emergency cloud implementations are not sustainable over the long term, cloud services are an integral tool to helping businesses achieve their goals.

Download InformationWeek's State of Cloud Computing - Fall


How a Platform Approach can Solve Today’s Security Conundrum

by CBTSOct 22, 2020

How a platform approach can solve today's security conundrum.

Cisco SecureX connects the breadth of an integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens security across your network, endpoints, cloud, and applications.

Learn the pros and cons of the 3 approaches to security platforms: Solution-based platforms. Technology-based platforms (SIEM and SOAR). Integrated,


Simplify Your Security

by CBTSOct 22, 2020

A new approach that redefines security.

An integrated security portfolio and infrastructure that enables a consistent experience—unifies visibility, drives automation, and strengthens security across your network, endpoints, cloud, and applications that empower security teams, processes, and technologies.

Cisco SecureX will: Unify visibility across your entire Cisco security infrastructure. Automate critical security workflows. Enable collaboration. Reduce complexity


Improve your business with a Virtual CISO

by CBTSOct 22, 2020

Is your organization in need of security strategy or direction?

Is your organization lacking a security strategy, having difficulty adopting best practices, or seeking direction on security initiatives and projects? A Virtual CISO brings needed experience and can act in an advisory role or help you with short-term or long-term projects. Qualified CISOs are difficult to find and expensive to employ. A Virtual CISO could be the answer you've been looking for.

Improve your


Managed Threat Detection and Response

by CBTSOct 22, 2020

What you don't know CAN hurt you.
Security is complex and challenging and few organizations have the experts or infrastructure to protect their data. Managed Threat Detection and Response helps organizations reduce time to detect and contain breaches, helping to protect critical assets and resources.

What do you need to know? Not all data is created equally. When moving to a cloud model, the dynamics change significantly. A strong combination of security tools and experts are


SUBTOPICS:

CBTS

With deep capabilities across security, data, network, voice, managed services, monitoring and management, CBTS covers your technology needs with end-to-end expertise and is dedicated to driving business outcomes.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.