Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Q1 2019 Quarterly Threat Report

by eSentireJun 14, 2019

Read this report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.


Building and Managing an IT Security Operations Program

by Dark ReadingMay 03, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?


The Cost of Third-Party Cybersecurity Risk Management

by CyberGRXMay 07, 2019

A recent CyberGRX study finds a large disparity between the importance of third-party cyber risk management (TPCRM) versus how ineffective current practices are throughout all major industries. Findings show that organizations must move to a far more scalable and quantitative method of evaluation to reduce third-party cyber exposure and bring confidence to TPCRM.


A No Hassle Guide to Effective Third-Party Risk Management

by CyberGRXMay 07, 2019

Get your guide to identify risks, reduce costs and scale with CyberGRX. Discover how to prioritize third-party vendors who present the greatest risk to your organization, focus on proactive mitigation with dynamic & measurable data, and gain clear visibility into the full scope of your threat landscape.


Vendor Risk Management Guide: The 3 Fundamentals

by CyberGRXMay 07, 2019

This CyberGRX guide provides high-level instruction regarding the basic components of a complete vendor risk management (VRM) program, including Vendor Classification for a risk-based approach, Prioritized Assessment strategies, and Issue Management to scale for the long term.


The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

by eSentireMay 06, 2019

Review the report on the probability of your organization being exploited and how to remediate before your business is disrupted.


4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.


7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.


8 Steps to More Effective Small Business Security

by Dark ReadingApr 26, 2019

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.


Ribbon Analytics Application Portfolio

by Ribbon Communications Inc.Apr 22, 2019

A 360° understanding of IP data and RTC usage that delivers numerous use cases for services assurance, security and subscriber grow.


SUBTOPICS:

CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.