Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Crash Course: Get Up To Speed on E911 & STIR/SHAKEN Compliance

by BandwidthDec 02, 2020

Whenever new regulations come into effect, confusion is sure to follow. With RAY BAUM?s Act deadlines closing in, many enterprises still need to solve for the dispatchable location requirements for both fixed and nomadic VoIP. At the same time, service providers need to comply with STIR/SHAKEN rules designed to reduce robocalling and illegal phone number spoofing.


Frost Radar: Global Threat Intelligence Platform Market, 2020 from Anomali

by AnomaliDec 01, 2020

Within a field of eight competitors, Anomali was positioned on the Frost Radar as the clear innovation leader and ranked second in growth index. Frost & Sullivan profiled companies that demonstrate a commitment to improving their products and growing their market share.

Key points covered in the Frost Radar are as follows:

• Strategic Imperative and Growth Environment
• Frost Radar: Global Threat Intelligence Platforms Market
• Companies to

  • Anomali
  • Security Management & Analytics
  • Security Monitoring
  • Details

Economic Validation Report of the Anomali Threat Intelligence Platform

by AnomaliDec 01, 2020

Never before has it been so critical for enterprises to effectively empower an increasingly remote workforce with access to applications and resources across a number of geographic regions, networks, and devices.

Enterprises have been forced to quickly implement solutions, ease restrictions and policies, and remove barriers to entry, placing an even greater burden on their security teams to operate effectively and efficiently to protect the organization and its assets.

  • Anomali
  • Security Management & Analytics
  • Security Monitoring
  • Details

Threat Intelligence Solutions: A SANS Review of Anomali ThreatStream

by AnomaliDec 01, 2020

Cybersecurity is a daily, ongoing battle between sophisticated and motivated adversaries and defenders seeking not only to mitigate breaches and attacks, but also to prevent them from occurring. A key strategy for security organizations that want to become intelligence-driven is to be proactive in their cyber defense by utilizing external threat data.

To better understand technologies specifically designed to empower cybersecurity teams to work smarter and faster while capitalizing

  • Anomali
  • Security Management & Analytics
  • Security Monitoring
  • Details

The Protector's Guide

by OnticNov 30, 2020

An important security decision doesn't always require the most exhaustive investigative profile on every single person of interest that we encounter — many times, it requires 'just enough.'

In this whitepaper, get a framework so your security team can:

• Speak the same language when it comes to early threat detection
• Communicate more effectively on the basics
• Establish a professional baseline, or minimum standard when gathering or

  • Ontic
  • Risk Management/Security
  • Network & Perimeter Security
  • Details

Seeing Around Corners

by OnticNov 30, 2020

When you improve the way information is collected and connected, your business's fragmented data can transform into actionable security intelligence. This allows your security team to see around corners and quickly detect and disrupt possible threats. Download our guide to learn more about this proactive approach — and five reasons why it can't wait.

  • Ontic
  • Security Monitoring
  • Security Management & Analytics
  • Details

Crisis as an Opportunity for Reinvention

by OnticNov 30, 2020

There's undeniable value and recognition for the work corporate security teams are doing in the COVID-19 era to keep organizations and employees safe. However, as the needs and challenges of security teams are evolving in today's environment, this shift opens the door for reinvention.

In this whitepaper, we share how COVID has shaped the opportunity to reinvent the role that corporate security teams play within organizations, including opportunities to plan for an increase in

  • Ontic
  • Security Monitoring
  • Risk Management/Security
  • Details

Your Security Team's Practical Guide to Implementing Automation

by Rapid7Nov 23, 2020

Whether your security team consists of a pair of IT managers sharing a corner office or a distributed Security Operations Center (SOC) spanning the globe, efficiency is the key to a successful threat detection and response program. SOC automation—the process of automating and optimizing your security programs—is the ultimate efficiency. Check out the full guide to start harnessing the power of SOC automation.

  • Rapid7
  • Cybersecurity
  • Security Management & Analytics
  • Details

Practical Advice for Choosing Your First(or Next) SIEM

by Rapid7Nov 23, 2020

In this buyer's guide, get an overview of today's SIEM security market, what SIEM solutions can (and should) offer, and what to consider when evaluating vendors.

  • Rapid7
  • Cybersecurity
  • Risk Management/Security
  • Details

A Step-by-Step Guide to Shifting Left and Embracing a True DevSecOps Mentality

by Rapid7Nov 23, 2020

There is a major shift happening right now. It's not just affecting security teams, but IT operations and development teams, too. And it's something no company can afford to ignore today. It's the shift from web application security being the job of the security team to it being a shared initiative across many teams.

  • Rapid7
  • Cybersecurity
  • Risk Management/Security
  • Details