Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Linking, Orchestrating, and Managing Your Enterprise Security Systems

by ReliaQuest LLCJan 06, 2020

Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense.


Ransomware Defense for Dummies - 2nd Edition

by Cisco UmbrellaJan 31, 2020

Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense for Dummies eBook explores the top cyber security best practices to reduce ransomware risks.

Ransomware Defense for Dummies consists of 5 short chapters that explore:

• How it operates and its defining characteristics
• Cyber security best practices to reduce risk
• A new best-of-breed network security architecture
• The Cisco Ransomware Defense solution
• Important


The Role of Predictive Intelligence in the Fight Against Cyberattacks

by Cisco UmbrellaJan 31, 2020

Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. With threats increasing in sophistication and speed, you need intelligence that can learn from internet activity patterns, automatically identify attacker infrastructure being staged for the next threat, and block those threats before they have the chance to attack your organization. Download this white paper to learn how a predictive intelligence can aid in the


How Enterprises Are Developing and Maintaining Secure Applications

by Dark ReadingJan 30, 2020

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. Yet, with the skyrocketing speed of application development, many enterprises still struggle to build security into their software and eliminate dangerous flaws that might lead to data breaches. And most have experienced such severe security troubles with one application that they've simply migrated to a different one altogether.

In this 2020 Dark Reading


High Performance Applications

by RaritanJan 28, 2020

Broadcast, control room, government, military and other users of high performance applications face several challenges when it comes to remote access and control. They require ultra-fast switching, high definition video, low latency, and support for dual video and monitors. In addition, IT, engineering, and other departments also require 24/7 access to these computers to make sure if something does go wrong, it can be fixed quickly.

Download this white paper to learn about how


5 Key Applications of Serial Console Servers

by RaritanJan 28, 2020



Serial console servers are a critical piece of IT infrastructure and a smart investment for any enterprise IT shop because the technology allows for the secure, remote access and management of network and data center equipment.

The following white paper will detail the five key applications of serial console servers, explain the benefits of each and share real-world use cases on how organizations of all sizes can take advantage of the technology.

Download this white


KX III for High Performance Video Applications

by RaritanJan 28, 2020

KVM switches have been around for decades. Traditionally, they've been used by IT professionals to access servers that store information and run critical business services.

Learn why the Dominion KX III KVM-over-IP is great for both traditional IT tasks, and dynamic applications that require HD streaming video.


The State of Cloud Computing

by InformationWeekJan 23, 2020

Responses to our recently conducted State of Cloud Computing Survey reveal incremental shifts in how organizations are planning their cloud spending for the next two years. However, a closer examination shows the drastic differences in the needs that are driving how companies expect to spend. Find out what the survey revealed by downloading your copy of the report today.

Brought to you by:


Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


SUBTOPICS:

Cisco Umbrella

Avoid the aftermath with a before strategy. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Raritan

Raritan began developing KVM switches for IT professionals to manage servers remotely in 1985. Today, as a brand of Legrand, we are a leading provider of intelligent rack PDUs. Our PDUs and other intelligent power and energy monitoring products are transforming how companies manage their data center power chains. Our solutions increase the reliability and intelligence of data centers in 9 of the top 10 Fortune 500 technology companies.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.