Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How a Platform Approach can Solve Today’s Security Conundrum

by Cincinnati Bell Technology SolutionsOct 22, 2020

How a platform approach can solve today's security conundrum.

Cisco SecureX connects the breadth of an integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens security across your network, endpoints, cloud, and applications.

Learn the pros and cons of the 3 approaches to security platforms: Solution-based platforms. Technology-based platforms (SIEM and SOAR). Integrated,

  • Cincinnati Bell Technology Solutions
  • Endpoint Security
  • Cloud Security
  • Cybersecurity
  • Applications
  • Details

Simplify Your Security

by Cincinnati Bell Technology SolutionsOct 22, 2020

A new approach that redefines security.

An integrated security portfolio and infrastructure that enables a consistent experience—unifies visibility, drives automation, and strengthens security across your network, endpoints, cloud, and applications that empower security teams, processes, and technologies.

Cisco SecureX will: Unify visibility across your entire Cisco security infrastructure. Automate critical security workflows. Enable collaboration. Reduce complexity

  • Cincinnati Bell Technology Solutions
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Cloud Infrastructure
  • Details

Improve your business with a Virtual CISO

by Cincinnati Bell Technology SolutionsOct 22, 2020

Is your organization in need of security strategy or direction?

Is your organization lacking a security strategy, having difficulty adopting best practices, or seeking direction on security initiatives and projects? A Virtual CISO brings needed experience and can act in an advisory role or help you with short-term or long-term projects. Qualified CISOs are difficult to find and expensive to employ. A Virtual CISO could be the answer you've been looking for.

Improve your

  • Cincinnati Bell Technology Solutions
  • Cybersecurity
  • Network & Perimeter Security
  • Endpoint Security
  • Cloud Infrastructure
  • Details

Managed Threat Detection and Response

by Cincinnati Bell Technology SolutionsOct 22, 2020

What you don't know CAN hurt you.
Security is complex and challenging and few organizations have the experts or infrastructure to protect their data. Managed Threat Detection and Response helps organizations reduce time to detect and contain breaches, helping to protect critical assets and resources.

What do you need to know? Not all data is created equally. When moving to a cloud model, the dynamics change significantly. A strong combination of security tools and experts are

  • Cincinnati Bell Technology Solutions
  • Cybersecurity
  • Endpoint Security
  • Network & Perimeter Security
  • Cloud Infrastructure
  • Details

30 min Tutorial: Configuring Direct Routing for Microsoft Teams

by BandwidthOct 21, 2020

You?ve heard all about the high level benefits of Direct Routing, so let?s cut to the chase and see how setting it up actually works. Join us live as we walk through configuring Direct Routing for Microsoft Teams using Ribbon SWe Lite and Bandwidth Duet for Teams.


How to Build Your Own CDN

by Varnish SoftwareOct 21, 2020

These days, a DIY CDN offers you more control over your costs and your content and lets you decide how and when to deliver content. High-performance content delivery is key to your business and to your customers' user experience. Learn how you can take content delivery into your own hands with the Varnish DIY CDN solution and why you should want to.

Download now to learn: The evolution of the Content Delivery Network The changing content delivery landscape How to decide if building

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

Guide to Online Security During Unstable Times

by Varnish SoftwareOct 21, 2020

The global pandemic has created new challenges in digital security and made vulnerabilities ripe for exploitation. Security is not task-oriented or "one and done". It's ongoing, as threats are pervasive, with new vulnerabilities and attack vectors popping up every day.

Find out what measures you can take to keep your website, content delivery and data safe.

Download now to learn: Protecting valuable data is essential financially and reputationally Availability and uptime

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

4 Technologies That Eliminate Database Bottleneck

by Dell Technologies and IntelOct 21, 2020

Many databases are struggling to keep up with modern applications and growing data volumes. Fortunately, deploying these four technologies together can supercharge database performance.

  • Dell Technologies and Intel
  • Data centers
  • Applications
  • Details

How San Francisco Secured Its Cloud

by AvananOct 21, 2020

San Francisco's Cybersecurity team must provide protection for 50 City and County departments subject to widely varying risks and requirements. For example, the Department of Elections must be protected from state-sponsored cyber attacks while also being transparent to public oversight. To secure this, San Francisco turned to Avanon.

Read "How San Francisco Secured Its Cloud" to learn:
• How the City uses Avanan's unique DLP
• How the City leverages data to

  • Avanan
  • Cloud Infrastructure
  • Applications
  • Details

5 Questions Your Email Security Vendor Doesn't Want You to Ask

by AvananOct 21, 2020

Email gateways like Proofpoint and Mimecast were designed to protect on-prem email, but when you moved to the cloud, it revealed 5 vulnerabilities that expose users to attack.

Read "5 Questions Your Email Security Vendor Doesn't Want You to Ask" to learn:

• Why SEGs can't block insider email attacks
• Why SEGs allow attackers to bypass the gateway
• How impersonation attacks get through SEGs

  • Avanan
  • Security Management & Analytics
  • Cybersecurity
  • Details