Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Detecting and Stopping Online Attacks

by SonicWALLSep 23, 2021

Today?s cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top experts discuss executive strategies and actionable methods your security operations team can use to detect different types of attacks and trigger a quick, effective response.


The Latest Cloud Security Threats & How to Combat Them

by Qualys Inc.Sep 22, 2021

More businesses have shifted critical assets and operations to the cloud, as service providers enhance their security capabilities and companies adapt to more remote workforces. And cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

  • Cloud Security
  • Vulnerabilities
  • Details

Digital Transformation’s Impact on Customers, Users, and Employee Experience

by TwilioSep 22, 2021

The best digital transformation strategies require flexible platforms so that rapid changes can be made based on customer preference, market dynamics, and business strategy. But how do you plan and then execute this strategy? In this webinar, a leading industry analyst will join a technology thought leader to discuss how to incorporate all 3 of these elements into your customer experience.


3 Ways to Detect and Prevent Man-in-the-Middle Attacks

by GreatHornSep 21, 2021

Supply chain cyberattacks are on the rise and threat actors are using multi-phased strategies to access legitimate communications between parties and gain entry into systems. Vendor email compromise (VEC), a form of Man-in-the-middle (MitM) attack commonly used in supply chain attacks, detection can be difficult. With 58% of organizations reporting an attempted supply chain attack within the past year, and 75% falling victim to an attack, understanding the techniques and mitigation strategies


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

by KnowBe4Sep 21, 2021

DMARC, SPF, and DKIM are global anti-domain-spoofing standards, which can significantly cut down on phishing attacks. Implemented correctly they allow you to monitor email traffic, quarantine suspicious emails, and reject unauthorized emails. But less than 30% of organizations are actually using them. And even fewer are using them correctly. In this webinar, Roger Grimes, KnowBe4?s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way. You?ll also


Robot Coming to Rescue

by UiPathSep 17, 2021

Never before has automation taken center stage as a transformational technology. This is as true for businesses as it is for individuals. During the COVID-19 pandemic, automation has allowed businesses to continue responding to the needs of society at a time of huge and global disruption; most importantly, it has helped us to face into and solve new and emerging challenges. It is no mean feat to be able to support a globally dispersed workforce, which remains under pressure to respond to

  • UiPath
  • Operating Systems
  • Software
  • Details

RPA: Key Drivers for Time to Value

by UiPathSep 17, 2021

Robotic Process Automation (RPA) offers a range of demonstrable business benefits. Yet, the technology is new enough that adopters may be concerned about the time it takes to realize value and Return on Investment (ROI) from an RPA project. This paper highlights the drivers of time-to-value for RPA. Based on real user reviews of UiPath on IT Central Station, it discusses the importance of having a Total Cost of Ownership (TCO), end-to-end automation, cost savings, time savings, reductions in

  • UiPath
  • Big Data Analytics
  • Big Data
  • Details

How End-to-End Automation Enables Business Transformation

by UiPathSep 17, 2021

To go beyond robotic process automation (RPA) means using more smart tools and technologies. A successful automation starts with process analytics and planning and continues over the entire business transformation. This holistic approach to automation turns a one-off improvement project into a program, that's aligned with strategic business goals.

Creating an end-to-end automation program lets your enterprise gain resilience, timely adapt to changing market needs, and constantly

  • UiPath
  • Big Data Analytics
  • Big Data
  • Details

Transforming IT through RPA and AI

by UiPathSep 17, 2021

While technology is constantly changing, the challenges IT leaders face remain much the same: Too many applications, not enough integration. Mandates to increase customer satisfaction and decrease cost. High turnover rates due to ongoing repetitive manual tasks. With Robotic Process Automation (RPA) you get an end-to-end solution that has the flexibility and security necessary to empower your IT team with out-of-the-box IT automation solutions.

  • UiPath
  • IT Leadership
  • IT Strategy
  • Details

UiPath: A Robot for Every Person

by UiPathSep 17, 2021

People are the most powerful asset a company has. Employees are critical to business success today and growth tomorrow, yet they are often stuck working on mundane and repetitive tasks — taking time away from valuable work. When digital transformation initiatives emerged decades ago, the objective was clear: help companies modernize operations and improve processes. Such initiatives were top-down exercises focused on systems and workflows. Yet, top-down mandates had a fundamental flaw. As

  • UiPath
  • Network and Systems Management
  • Infrastructure
  • Details