Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Optimizing Your Network

by Park PlaceDec 02, 2021

Today, we're counting on our corporate networks more than ever. Complex applications, remote access, and demands for edge computing continue to grow exponentially in these difficult times. Network monitoring and troubleshooting have no plans of going away. In this webinar, we'll be covering the state of network optimization and tools and techniques for troubleshooting.


Analytics Workloads for the New Era of AI Applications

by DellDec 01, 2021

Data is fundamental to creating efficient business operations, discovering new revenue opportunities, and delivering exceptional customer experience. As the world continues to become increasingly technology-centric, with an ever-growing number of data sources and streams, enterprises are facing the challenge of making sense of the staggering volume and diversity of data using traditional data processing application software. One of the most effective and proven way of dealing with such large and


Beyond Voice & Messaging – Innovate Customer Experiences with Programmable Digital Engagement

by RadiSys CorporationDec 01, 2021

Today's digitally powered economy is set to take off. By leveraging the high-bandwidth, low-latency network services, operators use APIs to expose their network services, allowing a vast community of new mobile and web application developers to create new experiences without telephony communications infrastructure expertise. With the rapid advances in fixed and wireless networks, such as 5G, service providers are in a position to leverage this new programmable communications paradigm to


What Elite Threat Hunters See that Others Miss

by Team CymruNov 29, 2021

We spoke with a multinational corporation with several business units that employs threat reconnaissance to improve security. This walkthrough will illustrate the value of employing analysts in more strategic ways to optimize the incident response process, as well as improve prevention and detection.

Many cyber security veterans may not recognize threat reconnaissance as an option for them, as the activity conjures thoughts of intelligence agencies and military. For many,

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

Forrester Total Economic Impact Report Infographic

by Team CymruNov 29, 2021

Total Economic Impact™ of Pure Signal™ Recon Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture

Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru's Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to tell third-party

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

The State of Threat Hunting and the Role of the Analyst

by Team CymruNov 29, 2021

Over 1,700 IT and IT security professionals across North America, Latin America, the UK and Europe responded to a Ponemon Institute study, commissioned by Team Cymru.

The results indicate that practitioners are working towards building more mature analyst teams and threat hunting capabilities, yet leadership lacks a firm understanding of the role these components should play in the overall security strategy.

The study tracks the level of importance placed on security

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

The Five Phases of AWS Cloud Security Strategy

by Guidepoint SecurityNov 29, 2021

As multi-cloud becomes more of a common deployment pattern, organizations need an approach that is both tactical and strategic at the same time. In this paper, you'll learn how to: Build a strong, firm foundation Establish a new perimeter strategy Address your cloud solutions

  • Guidepoint Security
  • Cybersecurity
  • Cloud Security
  • Cloud Services
  • Details

Secure Your Remote Workforce in the AWS Cloud

by Guidepoint SecurityNov 29, 2021

How are organizations maintaining security when a growing number of companies are allowing users to access company data from cell phones, personal laptops and dynamic locations? Find out in this paper where you'll learn about: Deploying a zero trust application The new cloud culture Amazon Workspaces

  • Guidepoint Security
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

Reckoning with Ransomware

by Guidepoint SecurityNov 29, 2021

There are a myriad of intricate events and considerations that occur over the life of an incident and during the incident response process. This paper will walk through the timeline of a hypothetical ransomware incident and examine the steps to handle similar situations. What steps your organization's ransomware response should include Who needs to be included in your organization's ransomware response communications What the recovery process can look like when a solid plan is

  • Guidepoint Security
  • Cybersecurity
  • Security
  • Details

Implementing XDR to Modernize Enterprise Security

by Dark ReadingNov 29, 2021

Extended detection and response (XDR) promises to provide visibility across an organization's endpoints, network, and cloud workloads. XDR could be the answer to many enterprise security teams' prayers, except that the SIEM market had made similar promises and fallen short on delivering them. For XDR to succeed on a wide scale, enterprises need to understand and plan for the implementation challenges. This report highlights the considerations and strategies that contribute to XDR success.

  • Dark Reading
  • Cloud Services
  • Software as a Service
  • Endpoint Security
  • Platform as a Service
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details