Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Relationship Between Security Maturity and Business Enablement

by AT&T CybersecurityJan 26, 2023

In March 2020, AT&T Cybersecurity and Enterprise Strategy Group (ESG) completed a benchmark survey to better understand what a mature cybersecurity program looks like and how that maturity influences security and business outcomes.

Results from the 500 security professionals surveyed on their processes, policies, and controls were mapped into the NIST Cybersecurity Framework's (CSF) five foundational cybersecurity functions: Identify, Protect, Detect, Respond and Recover.

  • AT&T Cybersecurity
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

Evaluator's Guide for Managed Detection and Response (MDR) Services

by AT&T CybersecurityJan 26, 2023

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.

In this evaluator's guide, you'll learn what to look for and what questions to ask when assessing an MDR solution, including:

• The basic services every MDR should provide
• 10 key elements to evaluate
• 4 pitfalls to avoid

Download this guide now to better equip yourself on what to look for in

  • AT&T Cybersecurity
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

Enable and Protect Your Remote Workforce

by AT&T CybersecurityJan 26, 2023

This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment, covering:

• Cybersecurity risks for remote workers
• Challenges of security for remote access
• Helping a new remote workforce withstand cybersecurity risks
• What to look for in remote security solutions

Download today to take a holistic approach to help protect your

  • AT&T Cybersecurity
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

The Essential Guide to Secure Web Gateway

by AT&T CybersecurityJan 26, 2023

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It's challenging for administrators to maintain visibility and control over data, or to apply unified security policies. Secure web gateway (SWGs) using cloud-native technology help provide coverage to these and other gaps.

This white paper details:
• 5 network disruptors—and how a SWG solves for them
• Technologies

  • AT&T Cybersecurity
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

VMware Backup For Dummies

by Veeam SoftwareJan 26, 2023

"Your virtual machines are at the heart of all that your business does, hosting practically any workload from mission-critical backup applications to dev/test environments." In VMware Backup For Dummies, find out how you can implement agentless backup to ensure seamless recovery of critical workloads. Dive in to discover the best recovery methods and data protection solutions to ensure maximum business continuity. Here's what's covered inside: Explore VMware backup tools and components

  • Veeam Software
  • Security
  • Cybersecurity
  • Details

5 Reasons to Switch Backup

by Veeam SoftwareJan 26, 2023

"Most legacy backup solutions in the market today aren't very good. Challenges include IT admins lack the time, resources and energy to proactively tackle real business challenges. The frustration is real!

You're not alone. IT pros around the globe feel your pain! This quick read is designed to help you understand the most common reasons other organizations have switched their primary backup solution and why now is the best time to make this switch."

  • Veeam Software
  • Security
  • Cybersecurity
  • Details

DEMO VIDEO: Instant Recovery

by Veeam SoftwareJan 26, 2023

"Instantly recover even more of your data center's workloads with seamless recovery for Microsoft SQL, Oracle and NAS backups from the pioneer of Instant VM Recovery® and: Instantly recover a SQL Server database Recover any image-based backup to Hyper-V Achieve instant recovery of a file share

  • Veeam Software
  • Security
  • Cybersecurity
  • Details

10 Best Practices for VMware vSphere Backups

by Veeam SoftwareJan 25, 2023

"VMware is still the market leader and many Veeam® customers use VMware vSphere as their preferred virtualization platform. But, the backup of virtual machines on vSphere is only one part of service availability. Backup is the foundation for restores, so it is essential to have backups always available with the required speed."

The "10 Best Practices for VMware vSphere Backups" whitepaper discusses best practices with Veeam Backup & Replicatio&trade v11 and VMware vSphere, such as:

  • Veeam Software
  • Security
  • Cybersecurity
  • Details

Getting 911 Right

by BandwidthJan 24, 2023

Although the final phase of RAY BAUM?s Act went into effect more than a year ago, many enterprises still struggle to understand what it means to be compliant. You?re on the hook for providing emergency responders with an accurate dispatchable location for your employees, whether they?re in the office, or wherever ?work from home? means. But with challenges around location provisioning and detection for nomadic users, you probably also need a specialized emergency solution to make


How to Simplify Security with a Cybersecurity Mesh Architecture

by FortinetJan 19, 2023

Digital acceleration demands integrated protection

As networks become more complex and distributed, detecting and responding to threats has become increasingly difficult. Organizations driving digital acceleration must leverage a true cybersecurity platform to reduce complexity and costs.

Get the checklist to learn more about: Unsuccessful security approaches Necessary capabilities of a CSMA Benefits of a mesh platform

  • Fortinet
  • Cybersecurity
  • Security
  • Details