Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Power Management 101: A quick guide to getting the most out of your hardware

by EatonMar 18, 2020

This handbook covers the basics of connectivity including network cards, cybersecurity, remote monitoring and tips for selecting a power management solution. If you want to better understand why monitoring and managing your power infrastructure is important or just want to gather some ammunition to convince your boss of this, enjoy the visual guides, FAQs, best practices and questions to consider included in this guide.


UPS Fundamentals Handbook

by EatonMar 18, 2020

From plug and receptacle charts and facts about power problems to an overview of various UPS topologies and factors affecting battery life, you'll find a wealth of pertinent resources designed to help you develop the optimum solution. This handbook is your one-stop source for essential information ... whether you need power protection for small, medium or large data centers; health care facilities; or other environments in which ensuring uptime and safeguarding data are critical.


Quick Guide to Power Distribution

by EatonMar 18, 2020

Rack power distribution units, A.K.A. rack PDUs, are a key component to any IT environment. The right unit can allow you to monitor and control the power at the individual outlet, switch power on and off, remotely shut down the power during an emergency power outage, or simply distribute power efficiently and safely. Learn more about rack PDUs and the modern benefits they can have for your business.


Disaster Recovery Checklist

by EatonMar 18, 2020

Disaster can strike at a moment's notice. Whether it's an everyday power outage or calamitous weather event, you need a recovery plan at the ready. Included are specifics on IT inventory assessments, network structures and diagrams, back up data procedures and more. Based on this thorough guide, you will be able to assess your current disaster recovery plan or build one from scratch.


Third-Party Cyber Defense: A New Level of Control & Visibility by Tracking the Adversary

by PrevailionApr 01, 2020

Most of today's businesses are beholden to a fundamental weakness—lack of visibility. As businesses grow larger, their vast third-party vulnerabilities unfurl themselves, exposing the business to huge risks they aren't even aware of and can't control.

Prevailion proposes a new paradigm for security. Instead of living cloistered within a defensive apparatus, surrounded by expensive endpoint solutions, we propose an offensive tactic - tracking the threat actors' every moves.


2020 State of Enterprise IT Report

by InformationWeekMar 31, 2020

Digital Transformation Shapes IT Trends

The pace of innovation continues to accelerate as organizations become increasingly digital. IT investment, cloud computing, AI and analytics, along with a renewed focus on customers and business partners, are helping IT secure its strategic position in organizations. IT leaders aren't just considering but are implementing emerging technologies and concepts such as new cloud computing uses, a shift to analytics-driven decision making, and


Osterman Research-Nation-State Attack Survey: Top CISO Concerns

by AnomaliMar 27, 2020

The Situation Between the United States and Iran is Influencing CISO's Security Strategy and Operations.

Nation-state attacks--in which military of non-military government entities seek to infiltrate other governments, enterprises, or non-commercial organizations--are on the rise. For example, Microsoft revealed in mid-2019 that 8,000 of its enterprise customers had been targeted by these types of attacks during the previous twelve months.

Nation-state attacks are


Gartner Report: Top Security and Risk Management Trends

by Palo Alto NetworksMar 24, 2020

See the security trends Gartner believes are ripe for disruption and get their recommendation on how to improve your organization's resilience and defenses.

Download Gartner's new report, "Top Security and Risk Management Trends" to learn why:

• XDR was named one of the top 9 cybersecurity trends
• Security process automation is the key to eliminating repetitive tasks
• AI will create new security responsibilities for protecting digital business initiatives


Cyber Threats and Trends Report: 2019 Year in Review

by NeustarMar 18, 2020

The number of DDoS attacks increased three times over last year. Are you prepared?

Download this report to understand the latest trends in DDoS attacks and what you need to do, today, to keep your organization safe.


Best Practices for Mitigating Risk in a Global Online Environment

by NeustarMar 18, 2020

Reducing Online Fraud and Other Threats with UltraReputation

Online businesses lost an estimated $19 billion to ecommerce fraud during 2018 in the United States alone, while the overall cybercrime economy has grown to $1.5 trillion in annual profits.

Companies are working hard to fight this onslaught, but the tools they use can frustrate and alienate customers and add to their losses.

Download this whitepaper to learn how to quickly identify traffic that may be


SUBTOPICS:

Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali


Eaton

Eaton is a power management company made up of over 97,000 employees, doing business in more than 175 countries. Our energy-efficient products and services help our customers effectively manage electrical, hydraulic and mechanical power more reliably, efficiently, safely and sustainably. To help you maintain business continuity and prevent downtime, Eaton offers a comprehensive portfolio of backup power and distribution equipment, protecting you from a host of threats, including power outages, surges and lightning strikes. Eaton also provides a suite of power management solutions to enable you to monitor and control your power infrastructure.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Neustar

Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here: https://www.home.neustar.


Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.


Prevailion

Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.