IT Security

Encryption Is Now a Trojan Horse: Ignore It at Your Peril
The game of leapfrog between hackers and data security professionals continues. No sooner do organizations...

The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been...

Long-Term Data Retention with Veritas NetBackup
This white paper provides a technical overview of cloud storage as a long-term retention storage solution...

Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...

Elastic Cloud Gateways: The Evolution of Secure Cloud Access
Enterprise security groups today face a daunting task. While their core responsibility of protecting...

ServiceNow + Vonage: The Perfect Combo
Video Overview of Vonage Contact Center and ServiceNow - Vonage Contact Center (VCC) for ServiceNow integrates...

Modern upgrade opportunities powered by Veeam DataLabs
With the upcoming end of life of Microsoft Windows server 2008 R2, organizations need to have a plan...

Report Summary: TLS 1.3 Adoption in the Enterprise
This research project sought to gauge awareness of and adoption plans for the new TLS 1.3 specification...

Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...

NoSQL for Dummies
This easy to read guide to NoSQL databases provides the type of no–nonsense overview and analysis that...

Forrester: The Balanced Security Imperative
Balanced security requires firms to transition from treating privacy and data security as compliance...

Security Operations Maturity Model
A practical guide to assessing and improving the maturity of your security operations through Threat...

7 Characteristics of Successful Hybrid Cloud Strategies
According to Gartner, by 2020, 75% of organizations will have deployed a multiload or hybrid cloud model....

11 Recommended Security Practices to Manage the Container Lifecycle
This paper details 11 recommended practices for DevSecOps teams needing to move to a more modern application...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.