TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







The Forrester Tech Tide on Everything You Need to Implement a Zero Trust Strategy

by CyxteraSep 21, 2018

Read the complimentary Forrester analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention.


Definitive Guide to Software-Defined Perimeters

by CyxteraSep 21, 2018

Today's network security reality has changed. It's time for an identity-centric, zero-trust approach and it's called a Software-Defined Perimeter. The Definitive Guide discusses the core principles of SDP, the technical architecture - 'authenticate-first, connect second,' and uses cases. Learn more about the most comprehensive SDP solution in the market that goes beyond the SDP-spec to provide an adaptive, identity-centric full network platform built for the hybrid enterprise.


How VPNs and Firewalls Put You at Risk

by CyxteraSep 21, 2018

Security threats, employee work habits, and IT infrastructure have all changed to make VPNs and Firewalls less relevant -- and potentially even dangerous -- to your organization.


Are Your Network Users Over-Privileged?

by CyxteraSep 21, 2018

Businesses today protect against all sorts of cyber threats - hackers, malicious insiders, inadvertent actors, and even state-sponsored cyber attacks. One category that often goes underrepresented in conversations about prevention is privileged users. Are your network users over-privileged?


North American Government Agency Secures Access with Zero-Trust

by CyxteraSep 21, 2018

Read how one North American government agency secured access of 20,000 users and third-parties to applications, email, web services and datacenter across departments.


The Risk Management Struggle

by Dark ReadingSep 19, 2018

Dark Reading's 2018 Strategic Security Survey of 300 IT and security professionals indicates that a majority of organizations are struggling to implement a risk-based approach to security — even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Build the Best IT Budget for 2019

by InformationWeekSep 10, 2018

Budgeting season is here, which means it's the perfect time to examine your IT practices, systems and tools. Is your organization balancing the promise of emerging technologies with practicality of implementation, while at the same time taking user needs into account?

This InformationWeek Trend Report will help you get in the frame of mind for the coming budget season and will explore how to move ahead with technology while staying within cost limitations.

In this Report


Research Report: How Data Breaches Affect the Enterprise

by Dark ReadingAug 30, 2018

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the


3 Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuest LLCAug 14, 2018

Improve security and monitoring of AWS, Azure & Google Cloud.


The Log Parsing Challenge

by ReliaQuest LLCAug 14, 2018

Learn how to drive consistent security and unexpected value with log parsing


SUBTOPICS:

Cyxtera

Headquarters: Coral Gables, Florida

Cyxtera provides data center colocation, enterprise application cloud computing provider, hybrid cloud, cybersecurity and analytics solutions.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


ReliaQuest LLC

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.