Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Vulnerability Remediation Maturity Model

by Vulcan CyberAug 13, 2020

Scanning vulnerabilities won't protect your digital infrastructure from exploit. Digital business needs end-to-end vulnerability remediation delivered by mature vulnerability management programs.

Get "The Vulnerability Remediation Maturity Model" eBook and learn: The four stages of vulnerability remediation maturity. If your peers' perception of vulnerability remediation maturity attainment aligns with the reality. How to improve your vulnerability management program from any stage

  • Vulcan Cyber
  • Security platforms
  • Cybersecurity
  • Risk Management/Security
  • Details

The Missing Pieces You Need to Automate Vulnerability Remediation

by Vulcan CyberAug 13, 2020

Vulnerability remediation at scale isn't possible without cross-functional team collaboration and shared automation. Are your existing people and tools being used to their fullest extent to efficiently protect your critical business operations?

Download "Automating Your Vulnerability Remediation Process" and get these elusive, missing pieces: Free resources for vulnerability risk and exploit identification. Vulnerability remedies and solutions relevant to your unique infrastructure.

  • Vulcan Cyber
  • Network and Systems Management
  • Cloud Infrastructure
  • Operating Systems
  • Details

The Top 5 Mistakes Everyone is Making in Vulnerability Remediation

by Vulcan CyberAug 13, 2020

In vulnerability remediation, one size definitely does not fit all. Avoid making these five common mistakes and choose the right approach for your digital business.

Read this whitepaper to avoid making the same mistakes: Don't prioritize vulnerabilities based on outside risk intelligence alone. Automate the most mundane and repetitive remediation tasks. Don't let blind spots go unchecked.

  • Vulcan Cyber
  • Cybersecurity
  • Cloud Security
  • Database Security
  • Details

Data-Driven Vulnerability Remediation with Vulcan Cyber - A Case Study With Snowflake

by Vulcan CyberAug 13, 2020

Data-driven vulnerability remediation seems next level, but Snowflake is doing it today using Vulcan Cyber remediation orchestration.

Read this Vulcan Cyber case study and learn how Snowflake gets fix done: How to secure data at enterprise scale...as a service. How to let the data drive a vulnerability remediation program. Why a universal vulnerability remediation translator is needed to keep security and IT teams on the same page. Why Vulcan was selected to help Snowlake move from

  • Vulcan Cyber
  • Database Security
  • Software Platforms
  • Risk Management/Security
  • Details

The Best Free Vulnerability Management Tools

by Vulcan CyberAug 13, 2020

With so many new vulnerabilities to manage and fix, and an almost equally large number of vulnerability management tools available to security and IT operations teams, important, actionable remediation intelligence often gets lost in the fray.

Read this whitepaper to learn: Which free, open source tools can provide value to your vulnerability management program? When open source tools can effectively replace expensive, commercial alternatives. How to identify the right database for

  • Vulcan Cyber
  • Cybersecurity
  • Risk Management/Security
  • Network and Systems Management
  • Details

Best Practices for Mitigating Risk in a Global Online Environment

by NeustarAug 12, 2020

Reducing Online Fraud and Other Threats with UltraReputation

Online businesses lost an estimated $19 billion to ecommerce fraud during 2018 in the United States alone, while the overall cybercrime economy has grown to $1.5 trillion in annual profits.

Companies are working hard to fight this onslaught, but the tools they use can frustrate and alienate customers and add to their losses.

Download this whitepaper to learn how to quickly identify traffic that may be

  • Neustar
  • Risk Management/Security
  • Security Management & Analytics
  • Details

The Insider's Guide to IP Geolocation Data During COVID-19

by NeustarAug 12, 2020

A Closer Look at the Benefits of a Powerful Business Tool in a Changing Business Climate

IP geolocation data delivers foundational decisioning insights that power critical business applications in multiple industries, every hour of every day. Never has this insight been more important than during the current global pandemic since experts predict that 25-50% of the workforce will be working from home through 2021.

This white paper presents the insights and information you need to

  • Neustar
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Crack Down on Password Sharing with IP Intelligence and Human Insight

by NeustarAug 12, 2020

If you provide subscription-based content, password sharing can be a significant cause of revenue leakage.

In this special report, you'll discover 5 industry-leading best practices for using IP intelligence decisioning data, analytics, and human insight to address password sharing in a way that achieves both regulatory compliance and customer retention.

  • Neustar
  • Network & Perimeter Security
  • Risk Management/Security
  • Details

Making Voice Migration Simple: A Managed Service for Microsoft Teams

by AudiocodesAug 12, 2020

Microsoft Teams is the fastest growing app in Microsoft history. Organizations want a seamless and cost-effective migration to Microsoft Teams. Join AudioCodes and ScanSource to learn how Unified Communications as a Service (UCaaS) provides a simple route to voice-enabling Microsoft Teams. With AudioCodes Live for Microsoft Teams, AudioCodes offers a variety of managed services to empower partners to become Microsoft voice partners and complete their UCaaS portfolio, without having to add


Enterprise Automation: Do More with Less

by InformationWeekAug 12, 2020

In this IT Trend Report, we highlight the benefits of automation and the various tools as enterprises navigate turbulent times, try to do more with less, keep their operations running, and stay on track with digital modernizations.

Read the report and you'll: Learn how robotic process automation (RPA), artificial intelligence (AI) and machine learning (ML) are being infused to automate business processes. Understand how cloud is enabling autonomous systems Gain insights on how best

  • InformationWeek
  • Big Data Analytics
  • Cloud
  • Software as a Service
  • Details