Quantcast
Channel: Reg Whitepapers
Browsing all 1703 articles
Browse latest View live

High Risk Users and Where to Find Them

Explore the real impact of human risk on cybersecurity. Discover insights from eight years of data analysed by the Cyentia Institute and learn how a small percentage of users drive most phishing and...

View Article


M-21-31 compliance: meeting the federal mandate for logging.

Axonius enhances your log management capabilities, tying together every asset in your agency’s environment and providing a view into what’s there AND what’s missing—a fundamental capability that will...

View Article


Comprehensive Phishing and BEC Protection

Email is still how business gets done. But, this makes it the perfect target for phishing and business email compromise attacks. Cybercriminals are using increasing convincing tactics to trick...

View Article

How Axonius Can Help Your Organization Reach FISMA or FedRAMP Compliance

Axonius is a software-as-a-service (SaaS)-based platform that correlates asset data from existing solutions to provide an always-up-to-date inventory of assets. Axonius can help organizations uncover...

View Article

Axonius Federal Control Complexity

Federal agencies’ digital infrastructure is overwhelmingly complex, and getting more complicated by the day. More assets means more problems solved — but it also means more problems introduced.The...

View Article


The Road to Zero Trust For Federal Agencies

A proactive Zero Trust approach means that users are no longer trusted because they are authorized on a network and are instead evaluated after any action is attempted and then either authorized or...

View Article

What’s new in Operations Bridge 2024?

Discover what will become your new favorite features: Expanded GenAI in ITOM Aviator. Enhanced AI for predictive and causal analysis. Automatic event correlation for faster resolutions. A reporting...

View Article

Observability is the future of IT Operations

Observability isn’t just for SREs and developers anymore. It’s a game-changer for ITOps teams, helping your pinpoint and triage incidents with precision. Say goodbye to misdirected tickets. We'll show...

View Article


Performance benchmarks: A pocket guide

Tyk components are built in Go (Golang), the same language powering Kubernetes and Docker. Why Go? It’s up to 40x faster than Python and significantly outperforms Lua, the language used by other API...

View Article


M-21-31 compliance: meeting the federal mandate for logging.

Axonius enhances your log management capabilities, tying together every asset in your agency’s environment and providing a view into what’s there AND what’s missing—a fundamental capability that will...

View Article

How Axonius Can Help Your Organization Reach FISMA or FedRAMP Compliance

See how Axonius maps to the NIST 800-53 controls and learn how Axonius Federal can help your agency reach FISMA or FedRAMP compliance.Axonius is a software-as-a-service (SaaS)-based platform that...

View Article

Axonius Federal Control Complexity

Federal agencies’ digital infrastructure is overwhelmingly complex, and getting more complicated by the day. More assets means more problems solved — but it also means more problems introduced.Axonius...

View Article

The Road to Zero Trust For Federal Agencies

Axonius Federal Systems offers a platform to help agencies achieve Zero Trust. The benefits of Zero Trust include reducing the chance of cyber attacks and improving user experience.A proactive Zero...

View Article


Generative AI: Moving from PoC to production

Generative AI is revolutionizing operations by automating tasks, unlocking efficiencies, and helping to create new services. Businesses are now focusing on accelerated development and deployment of...

View Article

Scale up and speed on

Learn how companies accelerated SAP modernization with Amazon Web Services (AWS) and IBM in these AWS Partner Innovator stories.Remove the speed limits on your cloud modernization journey with AWS and...

View Article


AI + Human-Supported Transformation for Government: Leveraging Salesforce for...

Reimagine what’s possible for your organization. This guide dives into how AI and Salesforce are redefining efficiency, turning complex challenges into streamlined, impactful outcomes.

View Article

ZTE’s Strategy and Progress on AI

As a global leader in telecommunications and information technology, ZTE has not only provided leading communication network solutions but also made deep inroads into AI. Ms Grace Tang, Vice President...

View Article


Beyond the Login: Modern Identity Security for the Workforce How to minimize...

The evolving threat landscape has rendered foundational endpoint and access controls prone to breaches. Attackers routinely bypass multi-factor authentication (MFA) and endpoint detection and response...

View Article

Reimagine workforce access with an identity-first security strategy

In today’s hybrid IT world—complete with cloud, containers, VMs, and a diverse mix of remote workers, contractors, and third-party users—identity has become the last line of defense. Yet, while...

View Article

Reimagine Workforce Security for End-to-End Identity Protection

Today’s workforce is complex and distributed. They use a plethora of managed and unmanaged endpoints to access enterprise resources and applications, subjecting the organization to potential...

View Article
Browsing all 1703 articles
Browse latest View live