Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

30 min Tutorial: Configuring Direct Routing for Microsoft Teams

by BandwidthOct 21, 2020

You?ve heard all about the high level benefits of Direct Routing, so let?s cut to the chase and see how setting it up actually works. Join us live as we walk through configuring Direct Routing for Microsoft Teams using Ribbon SWe Lite and Bandwidth Duet for Teams.


How to Build Your Own CDN

by Varnish SoftwareOct 21, 2020

These days, a DIY CDN offers you more control over your costs and your content and lets you decide how and when to deliver content. High-performance content delivery is key to your business and to your customers' user experience. Learn how you can take content delivery into your own hands with the Varnish DIY CDN solution and why you should want to.

Download now to learn: The evolution of the Content Delivery Network The changing content delivery landscape How to decide if building

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

Guide to Online Security During Unstable Times

by Varnish SoftwareOct 21, 2020

The global pandemic has created new challenges in digital security and made vulnerabilities ripe for exploitation. Security is not task-oriented or "one and done". It's ongoing, as threats are pervasive, with new vulnerabilities and attack vectors popping up every day.

Find out what measures you can take to keep your website, content delivery and data safe.

Download now to learn: Protecting valuable data is essential financially and reputationally Availability and uptime

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

4 Technologies That Eliminate Database Bottleneck

by Dell Technologies and IntelOct 21, 2020

Many databases are struggling to keep up with modern applications and growing data volumes. Fortunately, deploying these four technologies together can supercharge database performance.

  • Dell Technologies and Intel
  • Data centers
  • Applications
  • Details

How San Francisco Secured Its Cloud

by AvananOct 21, 2020

San Francisco's Cybersecurity team must provide protection for 50 City and County departments subject to widely varying risks and requirements. For example, the Department of Elections must be protected from state-sponsored cyber attacks while also being transparent to public oversight. To secure this, San Francisco turned to Avanon.

Read "How San Francisco Secured Its Cloud" to learn:
• How the City uses Avanan's unique DLP
• How the City leverages data to

  • Avanan
  • Cloud Infrastructure
  • Applications
  • Details

5 Questions Your Email Security Vendor Doesn't Want You to Ask

by AvananOct 21, 2020

Email gateways like Proofpoint and Mimecast were designed to protect on-prem email, but when you moved to the cloud, it revealed 5 vulnerabilities that expose users to attack.

Read "5 Questions Your Email Security Vendor Doesn't Want You to Ask" to learn:

• Why SEGs can't block insider email attacks
• Why SEGs allow attackers to bypass the gateway
• How impersonation attacks get through SEGs

  • Avanan
  • Security Management & Analytics
  • Cybersecurity
  • Details

Cloud Email Security Expert: Ask Me Anything

by AvananOct 21, 2020

The days of on-prem email are over. You and your company are in the cloud. And that brings more cloud-based threats than ever before. Download this report to learn about the state of cloud email security from noted cybersecurity expert and Washington Post journalist Brian Krebs, including:

• The uptick in ransomware
• Post-delivery protection
• Securing the cloud suite

  • Avanan
  • Cloud Security
  • Endpoint Security
  • Details

The 2020 Microsoft Advanced Threat Protection Report

by AvananOct 21, 2020

In the most thorough analysis of its kind, Avanan analysts classified over 500,000 malicious emails, sent to real mailboxes protected by Microsoft's Advanced Threat Protection (ATP). This research identified the types of attacks that were blocked by ATP or EOP, and the types of attacks that were missed by both.

Read "The Microsoft ATP Report" to learn:
• Why ATP misses at least 18% of malicious emails
• How ATP works in different environments
• Why

  • Avanan
  • Security Monitoring
  • Cybersecurity
  • Details

IDC Workbook: Best Practices for Cloud Security

by ExtraHopOct 20, 2020

Most businesses use at least some public cloud infrastructure such as AWS, Azure, or Google Cloud Platform. But, as a security specialist do you know the vulnerabilities? What is your responsibility and what should be handled by your cloud vendor? In this report, IDC compiles learnings and best practices for cloud security.

You will learn:

• Which pieces of cloud security fall to service providers vs. users under the Shared Responsibility Model
• What are the suggested

  • ExtraHop
  • Cloud Security
  • Security Monitoring
  • Details

Top Threats to Cloud Computing: The Egregious 11

by ExtraHopOct 20, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways

  • ExtraHop
  • Cybersecurity
  • Cloud Security
  • Details