Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Advancing the Hybrid Cloud & App Modernization Journey with IBM

by IBMApr 13, 2021

In today's world, more now than ever before, enterprises are looking to accelerate their digital transformation efforts to accelerate delivery and drive innovation. Central to this movement is hybrid cloud, automation and AI. In this webinar, we will dive into combining existing on-premises business critical infrastructure with off-premises public cloud resources, cloud-native development with Kubernetes and Red Hat OpenShift, automation with Red Hat Ansible and real-world use cases. Come


Understanding XDR

by Palo Alto Networks, Inc.Apr 08, 2021

Over the past few years, many enterprises have discovered the benefits of endpoint detection and response (EDR) tools, which help to identify potential threats and warn security teams to take action. But today, many enterprises are also realizing that other threat surfaces, such as networks and clouds, also provide critical telemetry that can help security teams to quickly identify and respond to threats. In this webinar, experts discuss the benefits and limitations of EDR, and offer


Regulatory Compliance in a Cloud Environment

by Palo Alto Networks, Inc.Apr 07, 2021

One thing for certain is that you can?t rely on your cloud provider to assure that your assets are safe in the cloud with respect to compliance. Further, compliance laws are changing, as are retention rules for even simple information. Throw in some multi-cloud applications, a bit of remote work, and some shadow IT and the tasks for compliance become daunting. In this webinar, we discuss compliance, how the requirements vary from your own environment to the cloud, and ways the cloud can


Detecting and Mitigating Attacks on Remote Workers

by Deep InstinctApr 06, 2021

COVID-19 forced a rapid shift to remote work in every enterprise ?and created a green field for cyber attackers. Early attacks focused on COVID-themed phishing attacks, but today cybercriminals are finding new ways of compromising corporate data via home wi-fi, poorly-secured endpoints, and vulnerable mobile devices. In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices. More


The 2021 Threat Hunting Report

by DomainToolsApr 05, 2021

Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, reactive security technologies.

While many SOCs are struggling to cope with the current security threat workload, more organizations are adopting threat hunting as part of their security operations. They are discovering that proactive threat hunting can reduce the risk and impact of threats while

  • DomainTools
  • Network & Perimeter Security
  • Cybersecurity
  • Details

The Impact of the SolarWinds Breach on Cybersecurity

by DomainToolsApr 05, 2021

The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width and depth of state-sponsored attacks are yet to be determined, one thing is certain: the fallout from the SolarWinds hack is going to get worse before it gets better.

To help determine the impact this breach has had on organizations, Domaintools conducted a survey among security professionals in order to provide the infosec community

  • DomainTools
  • Cybersecurity
  • Security Management & Analytics
  • Details

Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?

In this Tech Insights report by Dark Reading, and sponsored by Palo Alto Networks, experts offer advice and recommendations on how to build an endpoint security

  • Dark Reading
  • Endpoint Security
  • Cybersecurity
  • Details

Key Drivers for Top of Quadrant and Customer Viewpoints

by TeamDynamixMar 30, 2021

This report showcases the 2021 IT Service Management Quadrant from Info-Tech SoftwareReviews. Dive into the 2021 rankings and learn what key success factors drive user satisfaction.

Key drivers for ITSM Leader Quadrant:
• Completeness of vision; breadth of functionality
• Ease of use; codeless platforms & low total cost of ownership
• Business value; evaluation of cost and benefits

  • TeamDynamix
  • Software as a Service
  • Platform as a Service
  • Details

Smart Service Management: Working Better Together with a Connected Enterprise

by TeamDynamixMar 29, 2021

For several years we've seen a migration away from simple IT Service Management (ITSM) toward Enterprise Service Management (ESM). More recently, this has evolved even further to Smart Service. With Smart Service the entire enterprise is connected and interacting in real-time; supercharged by integration and workflow - from IT to HR, to Sales and Marketing, even Facilities.

In order to deliver the best service, many are finding they need an ITSM platform that goes beyond the ITIL

  • TeamDynamix
  • Unified Communications
  • Applications
  • Details

Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingMar 25, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today?s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday?s security technologies are being remade with new capabilities, including artificial intelligence,

  • Cybersecurity
  • Database Security
  • Enterprise
  • Details