Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How Data Breaches Affect the Enterprise (2020)

by Dark ReadingOct 26, 2020

Over the past 12 months, there's been more of everything on the data breach front — except good news. Additionally, thanks to COVID-19 and the sudden movement toward home workers, data breaches have become even more common in recent months. Download Dark Reading's report, How Data Breaches Affect the Enterprise, to uncover how enterprises are responding to damage from phishing, targeted campaigns, vulnerability exploits, and denial-of-service attacks. IT organizations have undergone


Frictionless Security for Agile Game Development

by ExtraHopOct 28, 2020

As the makers of popular titles including "Dungeons and Dragons" and "Magic: The Gathering," international adventure game leader Wizards of the Coast entertains tens of millions of fans around the globe. In the highly competitive arena of online gaming, speed is key, and game development teams need to be able to roll out updates several times a day. That means security has to protect business applications and customer data without compromising speed or agility.

When Wizards added


How to Measure and Reduce Cybersecurity Risk in Your Organization

by Dark ReadingOct 19, 2020

It's hard for organizations to manage cybersecurity risks before they can monitor and measure them. In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Across the evolution of cyber-risk management, security metrics have at times been seen an arcane art, a hopeless pseudoscience, a series of educated guesses, and — in the best cases — a disciplined practice.

Here's what's inside: How to


Run and Transform

by Micro FocusOct 26, 2020

Digital Transformation is at the top of virtually every organization's list of objectives and concerns in 2020. The rules of business — and public sector — are being rewritten nearly every day as a combination of technology advancements, evolving customer expectations, process enhancements (e.g. digitization), and new business models are forcing executives to rethink prior IT strategies.

See how some customers are adapting to the COVID-19 economy by balancing the need to


2020 Digital Transformation Report

by Micro FocusOct 26, 2020

Throughout 2020, Micro Focus has been inviting industry professionals to respond to our Digital Transformation Survey. Already, we have heard from many organizations about their digital transformation (DX) plans and progress.

Get this ebook report to discover: Initial business insights and DX strategies Organizations' biggest DX challenges Where organizations are in their DX journey now and where they want to be in a year Our six key takeaways from customers' responses


World Wide Technology: Digital Transformation Customer Journey

by Micro FocusOct 26, 2020

The rules of business are constantly being rewritten. Technology advancements, evolving customer expectations, process enhancements, and new business models are forcing executives to rethink their IT strategies.

Fundamentally, organizations want to move faster, have greater agility, secure what matters most, and leverage insights to drive value.

Read this real-life example of how Micro Focus has helped customers run their businesses, while transforming them at the same time.


IDC FutureScape: Worldwide Digital Transformation Predictions

by Micro FocusOct 26, 2020

DX is at the heart of business strategies for companies of all sizes. IDC surveyed over 6,000 companies through their worldwide digital transformation executive sentiment, MaturityScape benchmark, and digital transformation investment guide studies to uncover specific trends.

Read the report to discover: IDC's top 10 digital transformation predictions What separates the leaders in transformation from the laggards Strategies, actions, and reactions to the portfolio of new digital


Threat Detection & Response Assessment

by BlumiraOct 08, 2020

Protecting against cyber threats in this era of remote work is more challenging than ever. Do you know if your organization has all of the capabilities to detect and respond to modern threats?

To help you do a gap analysis, Blumira has created a checklist of the different areas of threat detection and response — from logging to alerting to audits and compliance — so you can measure your current security maturity and identify any missing capabilities.


The Modern SIEM Evaluation Guide

by BlumiraOct 08, 2020

Traditional security information and event management (SIEM) solutions are overly complex, lack security insights and are costly and resource-intensive to deploy, manage and maintain. It's no wonder security and IT teams want to replace their legacy SIEMs.

This guide gives you a checklist of criteria to help you select a modern security platform that can meet your organization's needs, without significant overhead.

In this guide, you'll learn: Common challenges with the


Preventing Unwanted Guests in Your Mailboxes

by Adaptive ShieldOct 15, 2020

Shared mailboxes are commonly used in organizations today to enable multiple users to access the same email account. But due to their default settings, they may be enabling unwanted guests to access them as well.

Download this research report to learn: About the dangers of shared mailboxes How organizations can easily configure these entities to prevent infiltration How to get started with a proactive, automatic approach to preventing these and all SaaS misconfigurations


SUBTOPICS:

Adaptive Shield

Adaptive Shield addresses the challenge of SaaS misconfigurations across your entire application stack. We provide enterprises with a proactive, continuous, and complete SaaS security posture management solution that makes true native SaaS security simple.

Now you can automatically prevent misconfigurations and get total visibility to prevent cloud breaches and loss of valuable data. What's more, we support dozens of leading cloud apps including Office 365, Salesforce, Zoom, Slack and new app integrations are being added continuously.


Blumira

Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Micro Focus

Micro Focus delivers enterprise software to empower our 40,000 customers worldwide to digitally transform. With a broad portfolio, underpinned by a robust analytics ecosystem, the company enables customers to address the four core pillars of digital transformation: Enterprise DevOps; Hybrid IT Management; Security, Risk & Governance, and Predictive Analytics. By design, these tools bridge the gap between existing and emerging technologies, so customers can run and transform at the same time.