Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Ribbon Analytics: Fraud protect

by Ribbon Communications Inc.Oct 26, 2020

Unified Communications fraud continues to cost carriers and enterprises tens of billions of dollars per year. Bad actors typically commit telecom fraud for financial gains. In order to meet their objectives, bad actors often cover a broad set of call scenarios — from IP-PBX hacking, to subscription fraud, to Wangiri (one ring and cut) and other use cases. FraudProtect analytics application provides you with the insight and tools needed to identify and stop the UC fraud in your network.

  • Ribbon Communications Inc.
  • Enterprise
  • Unified Communications
  • Details

Ribbon Analytics: Application Portfolio

by Ribbon Communications Inc.Oct 26, 2020

The Ribbon Analytics application portfolio consists of Operations, Security and Monetization solutions that deliver numerous use cases for services assurance, security and subscriber growth. Powered by Ribbon Protect, a big data analytics platform, you can grow your investment with numerous out of the box applications to speed up deployments and provide a significant return on investment. This suite of applications enable you to secure your RTC network, monetize subscriber data with third

  • Ribbon Communications Inc.
  • Unified Communications
  • Enterprise
  • IP Telephony and Unified Communications
  • Details

Ribbon Analytics - TDoSProtect

by Ribbon Communications Inc.Oct 26, 2020

Telephone Denial-of-Service (TDoS) attacks are increasing every day. They are often part of an extortion scheme where a bad actor demands payment, then launches a continuous stream of phantom calls that block normal calls in your business until payment is received. Usually, the attacks start and stop randomly until the ransom is paid. Frequent targets include hospitals, government offices and public-safety answering point offices. Ribbon Analytics TDoSProtect application uses granular tracking

  • Ribbon Communications Inc.
  • Unified Communications
  • Enterprise
  • IP Telephony and Unified Communications
  • Details

How a Platform Approach can Solve Today’s Security Conundrum

by CBTSOct 22, 2020

How a platform approach can solve today's security conundrum.

Cisco SecureX connects the breadth of an integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens security across your network, endpoints, cloud, and applications.

Learn the pros and cons of the 3 approaches to security platforms: Solution-based platforms. Technology-based platforms (SIEM and SOAR). Integrated,

  • CBTS
  • Endpoint Security
  • Cloud Security
  • Cybersecurity
  • Applications
  • Details

Simplify Your Security

by CBTSOct 22, 2020

A new approach that redefines security.

An integrated security portfolio and infrastructure that enables a consistent experience—unifies visibility, drives automation, and strengthens security across your network, endpoints, cloud, and applications that empower security teams, processes, and technologies.

Cisco SecureX will: Unify visibility across your entire Cisco security infrastructure. Automate critical security workflows. Enable collaboration. Reduce complexity

  • CBTS
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Cloud Infrastructure
  • Details

Improve your business with a Virtual CISO

by CBTSOct 22, 2020

Is your organization in need of security strategy or direction?

Is your organization lacking a security strategy, having difficulty adopting best practices, or seeking direction on security initiatives and projects? A Virtual CISO brings needed experience and can act in an advisory role or help you with short-term or long-term projects. Qualified CISOs are difficult to find and expensive to employ. A Virtual CISO could be the answer you've been looking for.

Improve your

  • CBTS
  • Cybersecurity
  • Network & Perimeter Security
  • Endpoint Security
  • Cloud Infrastructure
  • Details

Managed Threat Detection and Response

by CBTSOct 22, 2020

What you don't know CAN hurt you.
Security is complex and challenging and few organizations have the experts or infrastructure to protect their data. Managed Threat Detection and Response helps organizations reduce time to detect and contain breaches, helping to protect critical assets and resources.

What do you need to know? Not all data is created equally. When moving to a cloud model, the dynamics change significantly. A strong combination of security tools and experts are

  • CBTS
  • Cybersecurity
  • Endpoint Security
  • Network & Perimeter Security
  • Cloud Infrastructure
  • Details

30 min Tutorial: Configuring Direct Routing for Microsoft Teams

by BandwidthOct 21, 2020

You?ve heard all about the high level benefits of Direct Routing, so let?s cut to the chase and see how setting it up actually works. Join us live as we walk through configuring Direct Routing for Microsoft Teams using Ribbon SWe Lite and Bandwidth Duet for Teams.


How to Build Your Own CDN

by Varnish SoftwareOct 21, 2020

These days, a DIY CDN offers you more control over your costs and your content and lets you decide how and when to deliver content. High-performance content delivery is key to your business and to your customers' user experience. Learn how you can take content delivery into your own hands with the Varnish DIY CDN solution and why you should want to.

Download now to learn: The evolution of the Content Delivery Network The changing content delivery landscape How to decide if building

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details

Guide to Online Security During Unstable Times

by Varnish SoftwareOct 21, 2020

The global pandemic has created new challenges in digital security and made vulnerabilities ripe for exploitation. Security is not task-oriented or "one and done". It's ongoing, as threats are pervasive, with new vulnerabilities and attack vectors popping up every day.

Find out what measures you can take to keep your website, content delivery and data safe.

Download now to learn: Protecting valuable data is essential financially and reputationally Availability and uptime

  • Varnish Software
  • Networking
  • Cloud Infrastructure
  • Details