Quantcast
Channel: Reg Whitepapers
Browsing all 1703 articles
Browse latest View live

Choosing Between MDR, MSSP, and SIEM-as-a-Service

The “as-a-service” approach to modern security operations has rapidly become the preferred method of many organizations to detect and respond to advanced threats that bypass their existing controls....

View Article


Converging Platforms Whitepaper

Almost every form of security technology aims to address a specific pathway exploited by attackers. For example, the goal of antivirus software is to detect and prevent the introduction of viruses onto...

View Article


AW Comprehensive Guide to Security Operations

An employee clicked a malicious link in a phishing email and an attacker, armed with ransomware, breaks into your enterprise. It’s 5:30 a.m. Do you trust that your enterprise and security team are...

View Article

Large Language Models: The Rise of Data

Large Language Models (LLM) have become widely adopted for Natural Language Processing (NLP) applications because of the greater accuracy, broader vocabulary, and richer creativity over more...

View Article

The AI Data Factory

Business Value of Information Assets Has Always Been About MonetizationOnly a couple of decades ago, the process of finding obscure or unrealized profits required painstaking analysis of financial data...

View Article


The latest trends driving global app development and hyperautomation

Build and automate with low-code: A global guide to 2024 tech trends.Citizen developers, faster and easier innovation, lowered quality and security risks, more meaningful work. All around the world,...

View Article

Business Value of ServiceNow Hyperautomation and Low-Code

Today, organizations like yours are increasing their efficiency and productivity while reducing costs, by empowering their employees with low-code and automation. Read this ebook for insights on how...

View Article

Unleash Your Developers' Superpowers: Drive Cost Savings and Agility with Low...

From managing complex backlogs to increased pressure maximizing resources, IT leaders like you are confronted by more challenges than ever. That’s why you need innovative ways to boost efficiency and...

View Article


Think Big: How strategic automation unlocks workforce productivity and...

Even as hyperautomation becomes more and more important in the evolving world of work, it’s essential to remember that the people in your organization are the key to a successful hyperautomation...

View Article


Executing a successful migration to AWS

As your organization prepares to make the move towards a cloud migration to Amazon Web Services (AWS), there is a lot to consider at every phase of your journey.Join Ryan Ryke, Founder and CEO of Cloud...

View Article

Migrating an on-premises VDI solution to AWS

By migrating your existing VDI solution to Amazon WorkSpaces Core, you can enjoy the security, scalability, and flexibility of AWS, while managing the entire solution with your familiar third-party VDI...

View Article

Phishing for Dummies

Protecting yourself and your business from phishing attacks can be a daunting task. While it's impossible to eliminate all risk, there are steps you can take to reduce the odds and your brand. Enter...

View Article

Two-Factor Authentication Evaluation Guide

In this guide, you will learn how to evaluate a solution based on:Security Impact - Does the solution reduce risks, and can it provide visibility into your environment?Strategic Business Initiatives -...

View Article


Security Outcomes for Zero Trust: Adoption, Access, and Automation Trends

At Cisco, we believe the promise of a zero trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in...

View Article

Risk-Based Authentication eBook: How Duo Can Reduce Risks for Hybrid Work

Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide.

View Article


Forrester Total Economic Impact Of Cisco Duo Infographic

Through four customer interviews and data aggregation, Forrester concluded that Cisco has the following three-year financial impact; view the infographic for a summary of solution benefits, user...

View Article

Access Management Buyer's Guide

The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Exploiting multiplying devices and login-fatigued employees has become a valuable currency for...

View Article


Forrester Total Economic Impact Of Cisco Duo Case Study

Cisco Secure Access by Duo uses a multi-layered approach to secure access to applications in the cloud or on-premises with multifactor authentication, single sign-on, and device posture checks. To...

View Article

Duo Trusted Endpoints: Establish Trust in Managed and Unmanaged Devices

Explore the full potential of device trust with Duo Trusted Endpoints. Strengthen your defense against unauthorized access to your digital assets.

View Article

The latest trends driving global app development and hyperautomation

Build and automate with low-code: A global guide to 2024 tech trendsCitizen developers, faster and easier innovation, lowered quality and security risks, more meaningful work. All around the world,...

View Article
Browsing all 1703 articles
Browse latest View live