Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

(At Least) One Thing You Don't Know About Cloud Backup

by InformationWeekJul 03, 2013

You Don't Know the Cutting Edge of Cloud BackupOnce upon a time (say, five years ago), IT departments that sent backups to low-cost cloud file services were ahead of the curve -- mainly because the norm was shipping hard drives and tapes to fireproof safes. Since then, the number and variety of cloud backup options and features have grown significantly. If you're still using cloud backup like a remote FTP site, you're doing it wrong.In this report, we'll debut results of our new InformationWeek

  • Business Continuity
  • Cloud computing
  • Data centers
  • Enterprise
  • Wireless
  • Network and Systems Management
  • Infrastructure
  • Offshore
  • Storage
  • InformationWeek
  • Details

[Case Study] Keeping School In Session with Anywhere, Anytime Visibility

by Schneider ElectricMar 01, 2019

Bainbridge Island School District chose EcoStruxure™ IT to ensure continued availability of its digital learning environment.

  • Schneider Electric
  • Data centers
  • Network and Systems Management
  • Details

[FreeBook] Network Security

by Taylor & FrancisAug 18, 2020

Network Security is relevant for those looking for understanding on several relevant topics such as authentication, mobile operating systems, and cyber resilience. The new edition also provides a brand new set of must-know fundamentals and tips.

This book features content from a range of CRC Press publications, including:

• Introduction to Computer and Network Security Navigating Shades of Gray, By Richard R. Brooks
• Managing A Network Vulnerability Assessment,

  • Taylor & Francis
  • Network & Perimeter Security
  • Security
  • Details

[SANS] The Need for Speed: Integrated Threat Response

by LookingGlass Cyber Solutions, Inc.Feb 06, 2019

This paper discusses the concepts of security automation and integration and provide recommendations on how to use automated technology to make your team faster and more efficient. It's time security teams have a tool to keep up with modern attacks.

  • LookingGlass Cyber Solutions, Inc.
  • Cybersecurity
  • Security Monitoring
  • Details

[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.

  • Dark Reading
  • Security
  • Endpoint Security
  • Risk Management/Security
  • IT Strategy
  • Network & Perimeter Security
  • Details

[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 26, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.

  • Dark Reading
  • Security
  • Endpoint Security
  • IT Strategy
  • Risk Management/Security
  • Cybersecurity
  • Details

[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.

  • Dark Reading
  • Cloud Security
  • Cloud Services
  • Cloud
  • Security
  • Risk Management/Security
  • Details

[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'

  • Dark Reading
  • Cybersecurity
  • Risk Management/Security
  • Security Monitoring
  • Details

[Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingNov 01, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption,

  • Dark Reading
  • Cloud Security
  • Security
  • Details

[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem

by Dark ReadingJun 26, 2017

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Details