Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Security and Intelligence with Ribbon Analytics

by Ribbon Communications Inc.Apr 03, 2019

Consolidate your Network Tools for Real-time Communications Security and Operations.

Ribbon NetProtect

by Ribbon Communications Inc.Apr 03, 2019

Security intelligence sharing: A more pragmatic approach to securing your real time communications network


by Ribbon Communications Inc.Apr 03, 2019

Everyday bad actors are attempting to fraudulently hack communications networks for reasons such as financial gain, denial of services, theft of services, or simply an ideology. In fact, telecommunication fraud loss alone has been estimated at $29 billions in 2017 by the Communications Fraud Control Association (CFCA).

Ribbon FraudProtect is an application that helps identify when fraudulent activity is occurring in your communications network. It monitors calls, identifies unusual or

Considerations for Choosing an ATO (Account Takeover) Security Solution

by SpyCloudSep 05, 2019

Account takeover (ATO) isn't slowing down. According to the 2019 Verizon Breach Report, 80% of hacking-related breaches involve the use of weak and stolen credentials. To protect your organization, you need to choose an ATO solution that incorporates multiple modes of defense. In this guide, we share best practices and guidelines for evaluating potential solutions.

Understanding the Underground Market for Stolen Credentials

by SpyCloudSep 05, 2019

Even after the fall of the large darknet markets, a sophisticated underground ecosystem still thrives on the sale and trade of stolen credentials. Phishing and spear-phishing attacks are becoming increasingly complex—and that's just the tip of the iceberg. In this white paper, SpyCloud experts provide an in-depth analysis of how underground markets operate, how they are changing, and how you can protect yourself and your company.

Understanding the Latest NIST Password Guidelines

by SpyCloudSep 05, 2019

Over the years, security professionals have learned surprising lessons about how password policies affect user behavior. Faced with complex requirements, people often take dangerous shortcuts.

To help organizations mitigate the risk posed by users' bad password habits, the National Institute of Standards and Technology (NIST) designed a set of password guidelines with human behavior in mind. Read this white paper from SpyCloud to understand what NIST's guidance means for your

Password Remediation Playbook

by SpyCloudSep 05, 2019

What should you do if your employee's password is exposed in a breach? If you're in this position, you need to take action right away to protect your enterprise. Criminals actively exploit stolen login information to take over accounts, drain funds, and infiltrate corporate networks. In this guide, learn the 5 steps you should take to remediate an exposed account.


by Ribbon Communications Inc.Sep 18, 2019

Ribbon Analytics' solution to detect and mitigate telephony denial of service attacks, ensuring traffic on your real-time communications networks is not compromised by a flood of malicious calls

The Role of Kubernetes in Cloud Security

by LaceworkSep 18, 2019

With the rapid adoption of Kubernetes for application and infrastructure orchestration, there's a corresponding increase in the risk associated with data exposure and vulnerabilities throughout the application lifecycle. This whitepaper describes how to apply effective security so your organization has visibility, threat detection, and anomaly analysis to risks and threats for Kubernetes-deployed infrastructures, including publicly exposed and unsecured API servers and management consoles.

2019 Definitive Guide to Public Cloud Security

by LaceworkSep 18, 2019

To help organizations evaluate their cloud security options, Lacework analyzed how vendors compare across cloud server compliance, Kubernetes security, anomaly detection, container security, workload security, multicloud environments, and more.



A complete security platform for your DevOps workloads, containers, & cloud environments.

Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals' ability to profit from stolen information.