Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How Secure is Your Azure Cloud Environment?

by Revolutionary SecurityJul 31, 2020

Please note, this webinar has switched to on-demand only and will be available at the end of the month. Details on how to view will be emailed once available. Join Revolutionary Security cloud experts to learn how to protect your Microsoft Azure environment. We'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Get recommendations you can immediately put into practice to protect your


2020 State of DevOps Report

by InformationWeekJul 31, 2020

Enterprises are quickly moving to DevOps in order to deliver higher quality software faster, and DevOps is maturing a result. However, having the right DevOps tooling isn't enough. A solid DevOps initiative must also have the right culture and processes in place, because people tend to be the biggest barrier to any type of organizational change. The 2020 State of DevOps reveals where the advancements are happening and why, as well as where the challenges remain.

Download the 2020 State

  • Software Developers
  • Security Monitoring
  • Software
  • Enterprise
  • InformationWeek
  • Details

Case Study: Tackling the Challenge Of Non-Employee Management

by SecZettaJul 31, 2020

Geisinger had addressed the need to manage the non-employee population by developing its own homegrown non-employee management solution. Over time, this solution had fallen victim to a common problem with in-house solutions: lack of resources to maintain the solution at an acceptable level. Geisinger needed an out-of-the-box non-employee management solution that could be implemented in a short time-frame. The solution needed to cover the complex requirements and multiple use-cases related to

  • SecZetta
  • Risk Management/Security
  • Security platforms
  • Details

Protecting Mobile Apps and APIs from the Inside Out

by Arxan Technologies IncJul 29, 2020

From mobile banking to telemedicine to ecommerce, consumers are relying on web and mobile apps more than ever before. But as organizations become even more dependent on the revenue these apps generate, most still aren?t doing enough to protect applications against attacks that can compromise data or lead to fraud. Given the threat surface that applications expose, balancing the need for engaging customer experiences with robustly securing web and mobile applications and their underlying APIs


Reinventing the WFH Environment - Optimizing the Supervisor & Agent Experience

by Five9, Inc.Jul 29, 2020

As the pandemic pushes more customer interactions online, contact centers must reinvent the work-from-home experience in order to successfully navigate the new customer service landscape.According to a Nemertes Research, 77.6% of companies said that they will or probably will continue to allow employees to work from home. Therefore, supervisors must be equipped with the right contact center tools, not only to overcome common work-from-home challenges, but to also optimize agent engagement and


Online Traffic & Cyber Attacks During COVID-19

by NeustarJul 29, 2020

We all know that in recent months, we have changed the way we connect. How we do business, pursue hobbies, and stay in touch with family and friends all have changed. And we now have data that shows how things have changed online. Download this paper to review what is different, both in terms of traffic and in attacks specfically.

  • Neustar
  • Cybersecurity
  • Security Management & Analytics
  • Details

Protect Your Brand, Mitigate Fraud and Defend Your Domain

by NeustarJul 29, 2020

Companies in financial services are attacked by cybercriminals 300 times more often than those in other industries. To fight this onslaught, companies need a layered defense that incorporates comprehensive measures at every later of the IT stack, informed by timely, relevant threat data from authoritative sources.

Download this whitepaper to learn how those companies protect their brand reputation, mitigate fraud and protect their domains.

  • Neustar
  • Security Monitoring
  • Security Management & Analytics
  • Details

Keeping the Business Running with Remote Network Management

by Juniper NetworksJul 28, 2020

IT departments face a great challenge. In a manner of weeks (days, in some organizations), the way they work radically changed. Network management functions now need to be conducted from home. It?s as if every wiring closet, equipment rack, and data center is a lights-out operation. In this Network Computing webinar, our experts will discuss ways companies can make stronger transitions by using existing and new technologies -- and best practices.


Doing More IT With Less

by Dark ReadingJul 23, 2020

If there is one universal truth among IT organizations, it's a shortage of budget. IT professionals probably entered 2020 wondering whether you could do the job with the resources they had. Add in COVID-19 and a crashing economy, and we now have our answer. This information-packed event looks at some of the key strategies your IT organization can use to stretch your technology, rethink costly processes, and create new ways of doing business on a shoestring. Top IT practitioners, leaders,


Doing More IT With Less

by InformationWeekJul 23, 2020

If there is one universal truth among IT organizations, it's a shortage of budget.

IT professionals probably entered 2020 wondering whether you could do the job with the resources they had. Add in COVID-19 and a crashing economy, and we now have our answer.

This information-packed event looks at some of the key strategies your IT organization can use to stretch your technology, rethink costly processes, and create new ways of doing business on a shoestring. Top IT