Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Enabling a Security Investigation in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct an effective investigation in your Amazon Web Services (AWS) environment

  • Amazon Web Services
  • Cloud Security
  • Security Monitoring
  • Details

How to Secure App Pipelines in AWS

by Amazon Web ServicesDec 13, 2019

We are seeing nothing less than an evolutionary shift as security infrastructure moves to software-defined models that improve speed and scale, and afford enterprise IT more agility and capabilities than ever before. Application development and deployment are driving this shift, and as the pace of development increases, organizations have a real need to ensure application security is embedded in all phases of the development and deployment life cycle, as well as in the cloud during operations.

  • Amazon Web Services
  • Cloud Security
  • Security Monitoring
  • Details

3 Pillars of Cloud: Applications, Data, Infrastructure

by GenesysDec 12, 2019

Cloud is too big, too complicated and evolving too fast for most of us with real lives to keep up. When it?s time to start the selection process to replace core systems it can be daunting to find a place to start the discussion, much less to find the key pros and cons. Join Sheila McGee-Smith and Randolph Carter for an animated conversation that breaks down cloud into the three concepts that matter most as we move forward in this accelerating world.

  • Cloud
  • Applications
  • Infrastructure
  • Details

Implementing Agile Security Response

by ServiceNowDec 12, 2019

Data breaches constantly threaten enterprises today. And the risk continues to grow. According to the 2018 Cost of a Data Breach Study, the cost of breaches rose from $3.62 to $3.86 million, increasing by 6.4% from last year.

Coordinating incident response across the organization is the biggest challenge for most enterprises. Defining and tracking performance metrics can be extremely difficult. And all too often, manual processes force highly trained employees to focus on low-level

  • ServiceNow
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Costs and Consequences of Gaps in Vulnerability Response

by ServiceNowDec 12, 2019

Major data breaches continue to dominate the news, and almost 48% of organizations report that they have had a data breach in the past two years. As the severity and volume of attacks increase, the race to outpace attackers continues. Cybersecurity teams are not equipped enough to keep up, and need to leverage the right tools to detect and patch in a timely manner.

Major highlights of the Ponemon Report include:
• 60% of breach victims said they were breached due to an unpatched

  • ServiceNow
  • Security Management & Analytics
  • Security Monitoring
  • Details

Gartner 2019 Market Guide for Security Orchestration, Automation and Response Solutions

by ServiceNowDec 12, 2019

Gartner published this market guide in June of 2019 and it offers key insights into the value of SOAR solutions.

According to Gartner, "By year-end 2020, 30% of organizations with a security team larger than five people will leverage SOAR tools in their security operations, up from less than 5% today." ServiceNow is represented as a SOAR solution vendor in this guide and states "Security Operations is the product from ServiceNow that provides a security orchestration and automation

  • ServiceNow
  • Security Management & Analytics
  • Security Monitoring
  • Details

8 Simple Steps for Automating Governance, Risk and Compliance

by ServiceNowDec 12, 2019

From cutting costs to reducing risks and problems, there are many benefits to automating governance, risk and compliance (GRC). But what are the simplest ways to maximize value and minimize cost during implementation?

Check out 8 simple steps for automating GRC and learn how to create a GRC roadmap that:

• Scales with your business
• Reduces compliance costs and resource requirements
• Improves operational efficiency
• Provides continuous monitoring

  • ServiceNow
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Gartner Magic Quadrant for Integrated Risk Management

by ServiceNowDec 12, 2019

For the second consecutive year, ServiceNow is a Magic Quadrant Leader. And a driving force in defining the Integrated Risk Management market.

The Gartner 2019 Magic Quadrant for Integrated Risk Management is an invaluable aide for those seeking an unbiased, third-party evaluation of vendors as digital transformation continues to change the risk landscape.

By seamlessly embedding risk management and compliance activities into your digital business processes, ServiceNow helps you to

  • ServiceNow
  • Risk Management
  • Security Management & Analytics
  • Details

12 Things You May Not Know About Microsoft Azure

by AtmoseraDec 11, 2019

Are you leveraging all the benefits of cloud computing? Microsoft Azure has many tools designed to power company performance, including tools for analytics, advanced reporting, AI, data protection, DevOps, and much more. Join this webinar as we discuss 12 Azure features to strengthen security, increase ROI, comply with regulations, and meet your 2020 business goals.


How to Build a Threat Hunting Program in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat hunting program for your AWS environment, including tools and techniques for discovery and analysis. Know where to search for valuable data in logs and elsewhere, how to efficiently analyze that data using native AWS capabilities and how to enrich your findings through SIEM and SOAR technologies.

  • Amazon Web Services
  • Security Management & Analytics
  • Cloud Security
  • Details