Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


The 2021 Small and Midsize Business Security Outcomes Study

by CiscoJun 09, 2021

Security is ever-evolving to the point that success can sometimes feel elusive. What makes for successful cybersecurity in small and midsize businesses? Is there evidence that security investments result in measurable outcomes? How do we know what actually works and what doesn't for SMBs?

Zero Trust Guiding Principles

by Optiv | Palo Alto NetworksJun 09, 2021

We are in the midst of a massive paradigm shift in security deployment — one that goes beyond defense-in-depth.

Zero Trust builds on the concepts of "don't trust anyone" (least privilege), "divide and conquer" (network segmentation) and "who-are-you-where-are-you-and-what-are-you-accessing" (risk-based) access. And your new perimeter? It's Identity. And it can strengthen network, application and data protection.

Dive deep into this and more. Optiv's Field Guide #6:

Zero Trust Journey + Approach Infographic

by Optiv | Palo Alto NetworksJun 09, 2021

Expansion of traditional workforce, ubiquity of security threats, and an accelerated digital transformation journey have resulted in a paradigm shift, forever changing the traditional view of 'trusted network', giving rise to the concept of Zero Trust architecture. The evolving ecosystem warrants a paradigm shift in the way organizations approach the design and implementation of business processes and technical capabilities, aligning them with the "Zero Trust" model.

This infographic

Using ZTNA to Deliver the Experience Users Want

by ZscalerJun 03, 2021

Secure app access to your workforce from any device, anywhere, at any time.

Why IT leaders Should Consider a Zero-Trust Network Access Strategy

by ZscalerJun 03, 2021

Your role as an IT leader has evolved, and so too have the technologies that drive business decisions. Today, you are tasked with guiding your organization as it adopts public cloud services and allowing mobile users to work from any device, anywhere, while ensuring the security of the business.

To achieve these goals, you need a modern approach to security. In this paper you can read about: Changing technology and the evolving role of IT leaders Factors IT leaders must now

State of Encrypted Attacks

by ZscalerJun 03, 2021

The Zscaler threat research team analyzed 6.6 billion threats hidden inside encrypted traffic for a closer look into evolving attack techniques. Without proper inspection, encryption can be a vulnerability. ThreatLabZ, Zscaler's global research team, analyzed billions of encrypted threats delivered over SSL/TLS channels in 2020. Read the detailed report to learn how encrypted threats have become more sophisticated this past year, including: Explosive growth in volume: 260% increase in

The State of Zero-trust Security Strategies

by ZscalerJun 03, 2021

"The top area organizations expect to focus their attention on is improving collaboration across the cross-functional teams involved with zero trust." — ESG, The State of Zero-trust Security Strategies, February 2021.

Zero trust has become more prevalent than ever, yet many organizations grapple with what a zero trust initiative should entail, where to begin, and how best to overcome the challenges that result from a cross-functional undertaking.

In this report, ESG

VPN Risk Report

by ZscalerJun 03, 2021

Today, 93% of organizations use a VPN service, even though 94% are aware it's a target for cybercriminals.

The 2021 VPN Risk Report surveyed over 350 cybersecurity professionals to gain insight into the current remote access environment, state of VPN, rise in VPN vulnerabilities, and what remote access looks like moving forward.

In this new industry report, learn why: 72% of organizations are concerned that VPN may jeopardize IT's ability to keep their environments secure.

Three Secrets to Stopping Ransomware Cold

by ZscalerJun 03, 2021

Say goodbye to ransomware

So, is there a secret to stopping ransomware? Actually, there are three, and they start with taking a fundamentally new approach to your overall cybersecurity posture that is built in the cloud from the ground-up to protect users, applications, and sensitive data from potentially devastating ransomware attacks.

A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

by KnowBe4Apr 19, 2021

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization?s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you?re prepared to defend against



Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


KnowBe4, Inc. is the world's most popular integrated platform for Security Awareness Training and simulated phishing attacks. We help you manage the ongoing problem of social engineering.

KnowBe4 was founded on the principle that the human side of the cyber security industry is severely neglected. We have thousands of customers using our new-school security awareness training program to keep their networks safe.

We are in the business of training employees to make smarter security decisions.

Find out how affordable this is for your organization, you will be pleasantly surprised. Get a quote here:

Optiv | Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, continually delivers innovation to enable secure digital transformation — even as the pace of change is accelerating. With Security Solutions Integrator partner, Optiv, we innovate together with our clients, offering a prevention-focused architecture and end-to-end integrated solutions. We have designed solutions specifically focused on solving our client's largest and most complex cybersecurity and digital challenges.


Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing security and business policy. We deliver this service using our Global Cloud Infrastructure. Rather than buying appliances, we have a new on-demand business model, whereby customers pay a subscription fee. Our cloud service is built upon ground-breaking, high-performance technology that eliminates latency. Zscaler reduces risk, lowers cost, improves resource utilization, and simplifies IT administration.