Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to Navigate the Intersection of DevOps and Security

by Synopsys, IncJan 15, 2020

As organizations embrace DevOps, developers and operations work closely together to push new software out rapidly, while improving the quality and making customers happy. However, with speed comes risk. How can these teams build security into their new DevOps culture to ensure secure, high-quality software?

This eBook provides actionable insight into: What DevOps is and how security fits in The tools you need to implement DevSecOps How to train your team in the culture of


Developing and Managing an Endpoint Security Strategy for Your Enterprise

by Deep InstinctDec 02, 2019

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of ?endpoint security? has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user


Cybersecurity Research: 2019 AWS Cloud Security Report

by CloudPassageJan 14, 2020

If your public cloud were compromised tomorrow would you know what to do first? If you don't, you are not alone.

The numerous high-profile data breaches of 2019 have left organizations wondering how their peers are tackling cloud infrastructure security. CloudPassage partnered with Cybersecurity Insiders to survey and gather insights from their 400,000-member community about cybersecurity professionals' concerns, tools and best practices.

Read the AWS Security Report to learn what


2020 TAG Cyber Security Annual

by CloudPassageJan 14, 2020

The 2020 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The massive report offers expert guidance, analysis, and education on fifty different aspects of the cybersecurity ecosystem.

The report includes 50 different aspects of cybersecurity management that are deemed to be essential to any modern information risk reduction program by TAG Cyber. If you are considering a purchase in some area of cybersecurity protection, then this


Securing Real-Time Communications for Dummies Book

by Ribbon Communications Inc.Apr 22, 2019

Unified Communications maybe an open door to your network, you need an session border controller to protect what firewalls cannot do. Firewalls are designed to protect data networks and services from external threats and attacks, but unfortunately, they do a poor job of protecting enterprise communication services. Learn more why the right solution requires an session border controller (SBC) and how Ribbon's SBCs will protect an enterprise VoIP and UC services.


Firewalls vs SBCs

by Ribbon Communications Inc.Jan 14, 2020

Many believe firewalls are sufficient perimeter security but that is incorrect when it comes to protecting your enterprise VoIP services. Learn more why the right solution requires an session border controller (SBC) and how Ribbon's SBCs will protect an enterprise VoIP services.


Redefining the Enterprise Security Perimeter Solution Brief

by Ribbon Communications Inc.Jan 14, 2020

Attacks on enterprise unified communications traffic keeps increasing and the market needs a unified enterprise security perimeter that ties together next generation firewalls (NGFWs) and session border controllers (SBCs). Learn more about how Ribbon has addressed the need for such a solution.


SBC Core Hardened Security for an Untrusted Boundary

by Ribbon Communications Inc.Jan 14, 2020

How do you ensure a secure implementation of Unified Communications — you need a Session Border Controller. Read on to learn more about Ribbon's SBCs which will protect an enterprise from malicious attacks on either the signaling or media for UC services.


SANS Institute Report: Cloud Security Survey Results

by ExtraHopMay 06, 2019

Complex configurations don't mix well with rapidly spun-up components, and when your company uses multiple cloud providers to host your critical assets, the odds of a major security event get that much higher.

So how do you close visibility gaps and integrate conflicting datasets from different providers, and how do you adjust your current incident response strategies to respond to cloud-specific threats?

Read the report from SANS Instructor Dave Shackleford to learn how your peers


Executive's Guide to Integrating NetOps and SecOps

by ExtraHopJun 04, 2019

"Integrated NetOps and SecOps delivers tangible results: 38% OPEX reduction, 37% risk reduction, and much more."

Security operations (SecOps) and network teams (NetOps) have traditionally acted separately but increasing IT complexity and scale means that aligning these two groups is a critical step towards delivering a fast and secure user experience.

A recent global SANS Institute survey found that only 30 percent of SecOps teams already work closely with NetOps, so how can you


SUBTOPICS:

CloudPassage

CloudPassage is the leading provider of public and private cloud server security and creator of Halo, the industry's first security and compliance platform purpose-built for elastic cloud environments. Halo operates across public, private and hybrid clouds. Industry-leading companies like Foursquare, Avatar New York, and Martini Media trust Halo to seamlessly manage their server security configuration, host-based firewalls, intrusion detection and server account auditing from one system. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital and other leading investors.

For more information, please visit http://www.CloudPassage.com.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.