Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TDoSProtect

by Ribbon Communications Inc.Sep 18, 2019

Ribbon Analytics' solution to detect and mitigate telephony denial of service attacks, ensuring traffic on your real-time communications networks is not compromised by a flood of malicious calls

  • Ribbon Communications Inc.
  • Database Security
  • Risk Management
  • Details

Ribbon Analytics: Protect Platform

by Ribbon Communications Inc.Sep 18, 2019

The Protect platform is a virtualized, big-data solution enabling you to tap rich data sources to produce actionable intelligence based on real-time, correlated, time-aligned analytics.

  • Ribbon Communications Inc.
  • Big Data Analytics
  • Software Platforms
  • Details

The Role of Kubernetes in Cloud Security

by LaceworkSep 18, 2019

With the rapid adoption of Kubernetes for application and infrastructure orchestration, there's a corresponding increase in the risk associated with data exposure and vulnerabilities throughout the application lifecycle. This whitepaper describes how to apply effective security so your organization has visibility, threat detection, and anomaly analysis to risks and threats for Kubernetes-deployed infrastructures, including publicly exposed and unsecured API servers and management consoles.

  • Lacework
  • Risk Management
  • Cloud Security
  • Details

2019 Definitive Guide to Public Cloud Security

by LaceworkSep 18, 2019

To help organizations evaluate their cloud security options, Lacework analyzed how vendors compare across cloud server compliance, Kubernetes security, anomaly detection, container security, workload security, multicloud environments, and more.

  • Lacework
  • Cloud Security
  • Cybersecurity
  • Details

3 Critical Elements of Effective Security for AWS

by LaceworkSep 18, 2019

Apply the right tools and skill sets for you to gain control & visibility over your cloud environment through the lens of these 3 critical security elements.

  • Lacework
  • Security Monitoring
  • Cybersecurity
  • Details

DevOps Security for Cloud & Container Environments

by LaceworkSep 18, 2019

Security and compliance must be woven into any new framework, and this is no different with DevOps. New DevOps processes and tools must also follow an organization's information security and secure development lifecycle policy and process while additional security and compliance tooling may also be needed.

  • Lacework
  • Cloud Security
  • Security Monitoring
  • Risk Management
  • Details

Building a Threat Intelligence Program: Research Findings on Best Practices and Impact

by ThreatConnectSep 13, 2019

We surveyed over 350 cybersecurity decision makers about their services, products, and methods. This resulting report found that organizations that are leveraging threat intelligence to combat increasing cyber threats have seen a large business impact. In fact, organizations credit threat intelligence programs with saving businesses an average of $8.8 million over twelve months.

  • ThreatConnect
  • Security Management & Analytics
  • Security platforms
  • Details

SOAR Platforms: Everything You Need to Know About Security, Orchestration, Automation, and Response

by ThreatConnectSep 13, 2019

With a SOAR solution, it's possible to process data and mitigate threats in a single platform. You'll also learn how you can adapt to the adversarial landscape and use automation and orchestration to streamline your organization's security approach.

  • ThreatConnect
  • Security platforms
  • Security Monitoring
  • Details

Threat Intelligence Platforms: Everything You Want to Know, But Didn't Know to Ask

by ThreatConnectSep 13, 2019

Download this ebook to learn how a Threat Intelligence Platform (TIP) can help your organization move faster, collaborate more intently, and make better use of existing tools to aggregate, analyze, and act on threat intelligence. This book also talks about how to effectively use threat intelligence, expected capabilities of a TIP, the future of threat intel, and more. Read to the very end for a TIP checklist.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details

Open Source vs. Commercial Threat Intelligence Platforms

by ThreatConnectSep 13, 2019

In this whitepaper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligence platform. It will help you narrow down what your team needs and what solution best fits your cybersecurity strategy.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details