Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Network Monitoring Technology: Achieving Operational Excellence

by VIAVI SolutionsDec 13, 2019

Operating enterprise networks is getting more and more difficult by the day. Businesses rely on their networks to share information that drives productivity, revenue, partnerships, and customer loyalty. However many still wrestle internally with positioning networks, and their performance, as a mission-critical necessity. Download this eBook to learn how to maintain operational excellence while also delivering innovation through IT solutions.

  • VIAVI Solutions
  • Networking
  • Network and Systems Management
  • Details

State of the Network: NetOps and SecOps Collide

by VIAVI SolutionsDec 13, 2019

Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets. Download this study to learn more about the escalating demands faced by NetOps teams as they are pulled into security efforts as a growing rate, and how this continually increasing focus on security creates "mission creep" for NetOps teams that could compromise their ability to maintain network performance and troubleshoot user issues.

  • VIAVI Solutions
  • Networking
  • Network and Systems Management
  • Details

Building Business Cases for Investing in Network Performance Management

by VIAVI SolutionsDec 13, 2019

This guide reveals why network operations teams should invest in network performance management solutions, and how they can build the business case to convince IT management that these solutions will deliver a substantial return on investment.

  • VIAVI Solutions
  • Networking
  • Network and Systems Management
  • Details

XDR: Enterprise-Scale Detection and Response

by Palo Alto NetworksDec 13, 2019

What is XDR? Get the answers in this E-book

XDR replaces legacy siloed tools to provide visibility and analytics across your entire infrastructure. See how XDR supercharges detection, investigation and response capabilities to solve security operations challenges.

Download
XDR: Enterprise-Scale Detection and Response to understand the:

• Challenges with the current state of detection and response
• Definition and key requirements of XDR
• Tactical

  • Palo Alto Networks
  • Risk Management/Security
  • Security Monitoring
  • Details

Elements of Security Operations

by Palo Alto NetworksDec 13, 2019

Get Best Practices on How to Build a Better SOC

Elements of Security Operations dives into best practices on how to build a better SOC. Learn step by step how to make your security operations more effective, consistent and poised to tackle future threats.

Learn how to:

• Simplify operations with tool integration and consolidation
• Better use analyst talent by automating tasks
• Build consistent policy enforcement across networks, cloud and

  • Palo Alto Networks
  • Security Monitoring
  • Security Management & Analytics
  • Details

IDC Report: Key Requirements for EDR

by Palo Alto NetworksDec 13, 2019

Effective cybersecurity is critical to the success of digital transformation efforts. Unfortunately, many companies have vulnerable endpoints, leaving easy entry and exit points for attackers. Get insight into how to secure the endpoint and beyond.

Read this report to learn about the:

• Four central control points for securing a digital enterprise
• Strengths and weaknesses of current EPP and EDR vendor offerings
• Key EDR and EPP buying criteria to ensure

  • Palo Alto Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Forresters MITRE ATT&CK Evaluation Guide

by Palo Alto NetworksDec 13, 2019

Get Forrester's Guide on the MITRE ATT&CK™ to Choose the Right EDR for Your Organization

This report by Josh Zelonis, principal analyst at Forrester Research, helps readers understand the MITRE ATT&CK™ results and provides an objective analysis of the leading offerings in today's endpoint security marketplace. Download the Forrester MITRE ATT&CK™ Evaluation Guide to understand:

• The techniques used in the MITRE ATT&CK APT3 Evaluation
• The test

  • Palo Alto Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Building an Enpoint Security Strategy in AWS

by Amazon Web ServicesDec 13, 2019

Gain visibility into your endpoints, current threat intelligence, compliance status, and more by leveraging AWS services and solutions in AWS Marketplace.

  • Amazon Web Services
  • Endpoint Security
  • Cloud Security
  • Details

How to Build a Threat Detection Strategy in Amazon Web Services (AWS)

by Amazon Web ServicesDec 13, 2019

One major concern security teams have is losing visibility and detection capabilities when their organization moves to a cloud. While this might have been true in the early days of cloud services, these days providers are announcing new threat detection features and offerings almost every month. These new services open up the possibility of adjusting traditional network- and host-based monitoring to support intrusion detection in the cloud. In this paper, we focus on the key steps to detect

  • Amazon Web Services
  • Cloud Security
  • Security Monitoring
  • Details

Enabling a Threat Hunting Capability in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct effective threat hunting in your Amazon Web Services (AWS) environment.

  • Amazon Web Services
  • Cloud Security
  • Security Monitoring
  • Details