Please find below a carefully selected list of relevant White Papers.
Please Login or register as a teissMember to access any of these.

CISO Executive Brief: Supply Chain Attacks on Container Infrastructure

CISO Executive Brief: Supply Chain Attacks on Container Infrastructure

Aqua's security research team, Nautilus, analyzed 16,371 attacks on container and cloud native infrastructure which occurred over a period of 1 year, between June 2019 and July 2020.  The research aims to present the entire kill chain of attacks against cloud native environments.

10 Ways to Increase Security and Productivity During Remote Work

10 Ways to Increase Security and Productivity During Remote Work

Remote work doesn’t need to be a challenge with the right IAM strategy in place. Learn how LastPass Identity can secure and empower your remote workforce to keep employees productive and the business secure.

Debunk the Myths. Get Compliant.

Debunk the Myths. Get Compliant.

These claims have been widely spread so it’s easy to believe they’re true. But the fact is they are wrong—and they can waste your valuable resources, time and budget.

COVID-19: Business Resilience in the Face of the Unexpected

COVID-19: Business Resilience in the Face of the Unexpected

In just a few short months, the COVID-19 pandemic has shown its ability to affect virtually every person on the planet.

Underpinning innovation with real-time payments

Underpinning innovation with real-time payments

Real-time payments systems are proliferating around the world, with higher values and volumes together with greater cross-border connectivity. The industry is tasked with designing and creating the market infrastructure that supports this growth, and is increasingly turning to hybrid multi-cloud deployments to deliver a new wave of innovation that can take place within all manner of systems, from fraud detection through to liquidity management and accounting software.

Transforming Security Awareness in Our New World, An Opportunity for You?

Transforming Security Awareness in Our New World, An Opportunity for You?

Longing for a better approach for information security awareness training?

THE GUIDE TO MODERN IDENTITY

THE GUIDE TO MODERN IDENTITY

Identity is you. Identity is the behaviour, devices, access, and attributes that are unique to you as an individual in the workplace. But identity is complex. Every employee has their own identity, so every identity needs to be properly managed. Otherwise, the wrong users can access the wrong apps and resources, leading to security vulnerabilities and organisational inefficiencies. IT teams agree, there is a need to improve how businesses manage identity and ensure the security of their organisation.

HOW TO SECURE YOUR REMOTE WORKFORCE EFFECTIVELY

HOW TO SECURE YOUR REMOTE WORKFORCE EFFECTIVELY

Remote working is increasingly common. In 2019, over two-thirds of U.K. companies said they had a flexible working policy, allowing at least some of their employees to work remotely. For many workers, especially flexi-workers, remote working is the new normal. People on flexible contracts increase their efficiency by becoming digital nomads, taking their work with them wherever they go.

Equinix keeps atomised on track for ticketing systems connectivity in UK

Equinix keeps atomised on track for ticketing systems connectivity in UK

Atomised Co-operative company built a unified railway ticketing system but was faced with the challenge of how to effectively incorporate data from different ticketing information systems in the United Kingdom. They needed to access data from train stations with a physical network connection. Since Atomised is a cloud-only organisation, this proved to be a big issue. Equinix Managed Services bridged this gap with a virtual device between Atomised Equinix Cloud Exchange Fabric™ (ECX Fabric™) port and Google Cloud Platform and connected the required services seamlessly.

DVSA Deploys to the cloud, reduces latency with ECX fabric

DVSA Deploys to the cloud, reduces latency with ECX fabric

Learn how the Driver and Vehicle Standards Agency (DVSA), a UK government organization, chooses an interconnection strategy with Equinix Cloud Exchange Fabric™ (ECX Fabric™) as it moves services to the cloud, cutting latency by two-thirds and slashing time from months to hours to add new connections.

BASE Media Cloud and Equinix partner to create scale and connectivity

BASE Media Cloud and Equinix partner to create scale and connectivity

BASE Media Cloud, which tailors cloud solutions for digital media companies, had to scale its services so consumers could get content when they wanted, wherever they wanted it. BASE needed reliability, security, high speed and low latency to satisfy its customers. With Platform Equinix®, BASE got speed, security and efficiency by seamlessly connecting to multiple cloud services together via their own cloud gateway network.

The digital commerce infrastructure

The digital commerce infrastructure

Estimates may vary from 2 to 4 seconds but if a webpage takes longer than that to load then most likely at least half of the would-be visitors to the site will have clicked away to something faster.

PREPARING FOR DIGITAL TRANSFORMATION

SECURING THE UK FINANCIAL SECTOR

SECURING THE UK FINANCIAL SECTOR

Your 15 minute guide to security threats facing the UK financial sector

2020 Global Encryption Trends Survey

2020 Global Encryption Trends Survey

Now in its 15th year the 2020 Global Encryption Trends Study, conducted by the Ponemon Institute, is based on a survey of 6,457 individuals in 17 countries/regions.

A helpful guide for businesses: Data Breach Response Readiness

A helpful guide for businesses: Data Breach Response Readiness

With awareness of data breaches at an all-time high board members and senior leaders are increasingly involved in their organisations data breach readiness planning. Additionally many organisations are now investing time to establish employee privacy and cyber security programmes to raise awareness of the threats and manage increasing risk.

Cutting through the haze: Three ways to gain control of cloud security

Cutting through the haze: Three ways to gain control of cloud security

Migrating to the cloud offers several advantages, such as faster application deployment, instant storage and workload versatility. At the same time, the cloud presents unique security challenges.

Developers are taking over Appsec

Developers are taking over Appsec

Developers across the industry are stepping up to take more responsibility for their code's vulnerability management. In this report we discuss trends in how security is shifting left to the earliest stages of development, putting the power developers in the front seat. We explore the growth of automated tools aimed at helping developers do more with fewer resources and look for answers on what is needed to help close the gap from detection to remediation.

Embracing the Agile Movement: Strategies to Keep Pace in the Remote Work Era

Embracing the Agile Movement: Strategies to Keep Pace in the Remote Work Era

As the global workforce embraces a new remote work reality, it’s more important than ever for teams to be able to respond to change — and to respond with both speed and savvy. For decades, the most reliable competitive advantage a company could invest in was speed.

EQUINIX AND MODEX CASE STUDY

EQUINIX AND MODEX CASE STUDY

Simplitium leverages Platform EquinixTM to offer scalable, reliable and secure cat risk modeling services, ModEx, to its (re)insurance clients. The platform increases efficiencies while reducing model licensing cost and onboarding.

GDPR in nine simple steps

GDPR in nine simple steps

GDPR seems to be just around the corner. And for some organisations, even those that are already compliant with the Data Protection Act (DPA), achieving compliance seems like an overwhelming task. And let’s face it, most organisations are not compliant with the DPA, even if they think they are. If you are starting from a low compliance base then meeting the challenges of GDPR requirements can look very daunting.

GDPR in nutshell: An infographic report

GDPR in nutshell: An infographic report

We are now in the year of GDPR. In May, all companies will need to comply. The maze of compliance is solvable. We have summarised the new regulations that you need to follow, and also detailed our top nine steps to be GDPR-compliant in a handy infographic that is both easy to read and follow.

International Data Breaches: Have you thought of everything?

International Data Breaches: Have you thought of everything?

Our frontline data breach team has spent more than 10 years dealing with a broad range of challenging data breach response scenarios. Through their expert eyes, here is a Viewpoint paper that talks about some of the considerations.

Responding to a Cyber Breach

Responding to a Cyber Breach

teiss is an online and live event community of C-Suite decision makers who are responsible for setting and achieving organisational goals, and senior IT and security professionals who are tasked with protecting their organisations from digital risks.

The worst has happened and, despite all your care, hackers have broken through your information security defenses and stolen data. You need to respond to the data breach.

Social Media Risk

Social Media Risk

As social media ad spend surpasses the amount spent on TV for the first time, and mobile video traffic continues to rise with predictions that it will account for 75% of total mobile data traffic by 2020, businesses and individuals need to be more aware of the social media risks they could be facing.

The Definitive Guide to Rubrik Cloud Data Management

The Definitive Guide to Rubrik Cloud Data Management

Rubrik is the world’s first Cloud Data Management platform that delivers data protection, search, analytics, and copy data management to hybrid cloud enterprises.

What to do before hell breaks loose?

What to do before hell breaks loose?

Ivanti IT software is used by 78 of the Fortune 100. Enterprise IT departments use Ivanti to marry their ITSM, IT asset management, IT security, endpoint management, and supply chain capabilities. Ivanti’s mission is clear—to help our customers succeed through the Power of Unified IT.

Sophisticated phishing attempts, million-dollar ransomware payouts, malware being openly sold and traded online – there’s never been this many threats to your network. So how do you protect your organization? What’s the best defense? Download the white paper to learn:

What happens when you get back to the office? The business and IT perspective

What happens when you get back to the office? The business and IT perspective

It is an obvious statement, but a post-pandemic return to the office will not be an immediate return to normal. This makes return to workplace planning key, both in terms of managing staffing but also managing IT so to ensure it is not overwhelmed with software updates and network password resets.

The State of IT Resilience

The State of IT Resilience

An independent study by analyst firm, IDC, confirms the importance of IT resilience within hundreds of global organizations. The survey report spotlights the level of IT resilience within these companies and where there are gaps.

Gaining a competitive advantage through interconnection

Gaining a competitive advantage through interconnection

A global financial information company deploys on Platform Equinix®, and improves its customer service and competitive advantage by reducing the time to make data center changes by 90%

EQUINIX & EQUIFAX CASE STUDY

Global Interconnection Index

Global Interconnection Index

DISTANCE IS THE BIGGEST DIGITAL BUSINESS PERFORMANCE KILLER

Demystifying Threat Hunting

Demystifying Threat Hunting

‘Threat hunting’ has become something of a buzzword in the cyber security industry, and like any other buzzword the term is often misused. Proactive threat hunting is very different from manually searching through raw data to find an attacker, and threat hunting as a service is complementary to detection & response operations rather than a replacement for them. 

F-Secure Countercept whitepaper "Demystifying Threat Hunting" - Your threat hunting handbook

Buyer's Guide to Backup & Recovery

Buyer's Guide to Backup & Recovery

Backup and recovery need a radical rethink. When today’s incumbent solutions were designed more than a decade ago, IT environments were exploding, heterogeneity was increasing, and backup and recovery systems were viewed as the protection scheme of last resort.

A comprehensive, vendor-neutral Backup & Recovery Buyer's Guide to help you think through the strengths and weaknesses of backup & recovery solutions available today. This buyer’s guide covers: - Traditional backup requirements and challenges.