Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Why Your Contact Center Should Be Migrating to the Cloud

by GenesysFeb 26, 2020

Migrating to a cloud contact center solution enables your company to continuously provide meaningful experiences while delivering competitive results. Cloud solutions allow you to get automated, get predictive with your customers? needs and, more importantly, allow you to have a dynamic contact center that can help your company stay competitive. Join Robin Gareiss, Founder and President of Nemertes Research, and Derek Adams, Senior Product Marketing Director at Genesys, to learn more about why


Finding an Access Solution

by LogMeInFeb 24, 2020

So, you've decided your business could benefit from an access solution. Now what? To help, we've crafted a comprehensive guide to walk you through evaluating and comparing access solutions. Download the free guide to learn: Core components of an effective access solution Key problems an access solution should address A comprehensive set of criteria for evaluating solutions Best practices for implementing an access solution

  • LogMeIn
  • Cybersecurity
  • SMB Security
  • Details

Identity 101 for Businesses

by LogMeInFeb 24, 2020

What is identity, and what do you need to know about investing in a solution? To help, we've crafted an introductory guide to explain key concepts around identity and access management, so you can feel more confident when you're ready to explore or trial an identity solution.
Download the free guide to learn: why identity matters How an identity solution addresses key challenges The benefits you can expect from an identity solution Overviews of Single Sign-On, Enterprise Password

  • LogMeIn
  • SMB Security
  • Cybersecurity
  • Details

Global Password Security Report

by LogMeInFeb 24, 2020

LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The takeaway is clear: Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business' ability to achieve high standards of security. Download the free report today to see the current state of password security, access, and authentication — and learn what you can do today to better secure your company.

  • LogMeIn
  • Cybersecurity
  • SMB Security
  • Details

SMB's Guide to Modern Identity

by LogMeInFeb 24, 2020

LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity today. We surveyed 700 IT and security professionals at organizations ranging from 250-2,999 employees across a range of industries and countries.
Download this guide to: Learn about various identity technologies Understand the challenges, risks, & priorities for managing identity in the modern workplace Gain clarity and actionable steps to further improve your organizations IAM

  • LogMeIn
  • SMB Security
  • Cybersecurity
  • Details

Cloud Security Threats Enterprises Need to Watch

by BeyondTrustFeb 19, 2020

More businesses are shifting critical assets and operations to the cloud, as service providers enhance their security capabilities --and cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.


2020 State of Infrastructure Report

by InformationWeekFeb 14, 2020

Forecasts indicate that spending on digital transformation will reach $2 trillion by 2022. And, to support major new initiatives, organizations are investing in their infrastructure today, with an eye toward building a digital infrastructure for tomorrow. In this special report, you'll learn about key trends around overall spending, impacts on workforces, factors driving change, investment in innovation, key areas of infrastructure, and much more.

  • InformationWeek
  • Infrastructure
  • Data centers
  • Storage
  • Wireless
  • Details

Threat Hunting with Zeek Guide

by CorelightFeb 13, 2020

Threat hunting is a hypothesis-driven activity. Want to threat hunt in your network traffic, but unsure where to start? Download this threat hunting guide to learn key questions to ask and where in your network traffic you should hunt for answers.

  • Corelight
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Network Traffic Analysis Instrumentation Guide

by CorelightFeb 13, 2020

Network traffic analysis (NTA) can give defenders an enduring advantage against adversaries. Want to learn how and where to deploy NTA in your network? From egress points to data centers, download this NTA deployment guide and it will show you the way.

  • Corelight
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Shake the Box: How to get Encrypted Traffic Insights Without Decryption

by CorelightFeb 13, 2020

What happens when you can't decrypt? For privacy, cost, or performance reasons, decryption isn't always an optimal (or available) option. Don't give up, there are powerful threat insights that can be derived without decryption. Download this whitepaper to learn how.

  • Corelight
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details