Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Network Security: The Attacker’s Point of View

by SophosSep 17, 2020

Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today?s online attackers often bypass these defenses, entering the network through third-party networks or through stolen credentials.


Trends in CDN Use: Industry Insights Survey 2020

by Varnish SoftwareSep 17, 2020

Varnish Software conducuted a survey of 600+ technology leaders from across several major industries to gain insight into current content delivery network (CDN) use and CDN strategies.

Download the report to find out what they say about:
• How CDNs are being used and deployed today
• How future CDN development and use is shaping up
• How a hybrid/multi-CDN approach fits into businesses' content delivery strategies

  • Varnish Software
  • Unified Communications
  • Cloud Infrastructure
  • Details

The High Cost of Poor Web Performance

by Varnish SoftwareSep 17, 2020

Consumers cite slow and poor web performance as the key reason they abandon websites. As online business continues to grow and lead visibility and revenue, this is no time to play around and take big risks.

In this white paper, you will learn more about

• Potential causes, costs and risks of running a website that is not performing optimally
• How a supported, enterprise version of web performance software can help you maintain and capitalize on the promise

  • Varnish Software
  • Networking
  • Network and Systems Management
  • Details

7 Steps to Anywhere, Anytime Education: Content Delivery in Academia

by Varnish SoftwareSep 17, 2020

Major pushes toward enabling ubiquitous, anywhere-anytime education were already underway before the current Covid-19-driven lockdown, closing down schools at all educational levels, but now virtual education has become a must to ensure that education continues in the face of crises.

Download this eBook now to learn more about:

• How to manage security and privacy in online education
• Access control and implementing single sign-on technologies

  • Varnish Software
  • Network and Systems Management
  • Networking
  • Details

Tackling the Challenges of HTTP Streaming Delivery and Performance

by Varnish SoftwareSep 17, 2020

Streaming is unpredictable - learn how to tame and control your streaming.

How do you stream content seamlessly when end-users expect to navigate to their content of choice and push play for an immediate smooth streaming experience?

Download this e-book to get a detailed overview of:
• The streaming landscape
• The challenges of streaming
• Live vs OTT streaming
• Stream reliability / flow
• Resilience
• Origin

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

Implementing an Effective Defense Against Ransomware

by Deep InstinctSep 16, 2020

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and many more, providing expert advice on how to stop ransomware


How IT Security Organizations are Attacking the Cybersecurity Problem

by Dark ReadingSep 16, 2020

In 2019, enterprises encountered a wide range of new exploits and threats, as well as new challenges associated with online privacy issues and regulations. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Endpoint Security
  • Risk Management/Security
  • Database Security
  • Security platforms
  • Details

The Geek Guide to Calculating the ROI of DevSecOps

by Palo Alto Networks | Prisma CloudSep 16, 2020

Traditionally, security has been pushed off to the final stages of the process, bolted-on as an afterthought in the software development and delivery lifecycle. Before the DevOps concept took hold, when the entire process consumed many months or even years, this wasn't a big problem.

Now that more companies have adopted continuous integration and delivery (CI/CD) models, releases tend to occur in weeks or even days. In this model, waiting until the very last minute to ensure an

  • Palo Alto Networks | Prisma Cloud
  • Application acceleration
  • Operating Systems
  • Details

State of Cloud Native Security 2020

by Palo Alto Networks | Prisma CloudSep 16, 2020

Palo Alto Networks conducted a global survey to ask security and DevOps leaders on the forefront of the cloud and cloud native security ecosystem: What's happening in cloud native security today and what's working best for organizations.

The result is the largest, most globally expansive market research dataset on cloud native security to date. Leaders provided candid answers to questions on:

• What current and future investment levels in cloud and cloud native

  • Palo Alto Networks | Prisma Cloud
  • Cloud Security
  • Security Management & Analytics
  • Details

Unit 42 Cloud Threat Report: Spring 2020

by Palo Alto Networks | Prisma CloudSep 16, 2020

In the rush to automate more and more build processes in the cloud, many organizations are adopting infrastructure as code (IaC) to help streamline their operations. While IaC itself isn't new, many companies are adopting it for the first time. As often happens when moving quickly, this is opening them up to new risks.

Using a combination of proprietary Palo Alto Networks data and intel from public sources, Unit 42 cloud threat researchers analyzed hundreds of thousands of IaC

  • Palo Alto Networks | Prisma Cloud
  • Cloud Security
  • Security Management & Analytics
  • Details