Accelerate business innovation with on-demand internet connectivity
By: Lumen View more from Lumen >>
Download this next:
Uncover Invisible Threats with User Behavioral Analytics
By: Lumen
Type: White Paper
Insider threats, whether malicious or accidental, can exploit authorized access to steal data or cause disruption. Traditional security often misses these hidden threats. User entity and behavioral analytics (UEBA) uses machine learning to detect anomalies in user and entity behaviors, exposing potential security threats like insider attacks or compromised accounts.
This white paper explores how UEBA can neutralize the "Dark Passenger" - invisible threats within your systems, highlighting key topics such as:
- Identifying privilege escalation and unusual login activity
- Detecting unauthorized access attempts and data exfiltration
- And more
Browse the white paper to discover more.
These are also closely related to: "Accelerate business innovation with on-demand internet connectivity"
-
Enterprises see more, stop more with proactive cybersecurity
By: Lumen
Type: Blog
Lumen Technologies is expanding its Advanced Managed Detection and Response (Advanced MDR) services to enhance business resilience through proactive cybersecurity, with key features including:
- Extending threat detection across cloud, IoT, and user behaviors
- Enabling full asset visibility for continuous risk-based vulnerability management
- Using next-gen threat modeling based on the MITRE ATT&CK framework
- And more
Dig into the white paper to gain more insight and discover how Lumen's Advanced MDR can help enterprises tackle sophisticated threats and security talent shortages.
-
Revolutionising cybersecurity for tomorrow's threats
By: Lumen
Type: White Paper
As cyber threats grow more frequent and costly, traditional security measures fall short. Businesses must adopt a proactive, holistic approach to cybersecurity to stay ahead of risks.
This white paper explores how organizations can revolutionize their cybersecurity strategies, with key topics including:
- The shifting threat landscape and common security gaps
- Moving from reactive to proactive security with continuous monitoring, threat intelligence, and predictive analytics
- Implementing a holistic security posture aligned with business objectives
- And more
Browse the white paper to learn how a proactive, integrated approach can prepare your organization for future threats.
Find more content like what you just read:
-
Insights on Digital Transformation Challenges and Cloud Benefits
By: Lumen
Type: Analyst Report
This IDC report explores how digital transformation enhances application performance and customer experiences. Organizations should partner with external IT experts to overcome skills gaps and budget issues. The report highlights cloud services, network transformation, and AI/ML benefits. Read the report to accelerate your digital transformation.
-
Accelerate digital and network transformation with service providers
By: Lumen
Type: Analyst Report
This IDC InfoBrief explores the current and future state of digital and network transformation, highlighting the critical role service provider partners play in accelerating business outcomes. Key insights include top challenges, benefits, and criteria for evaluating partners. Read the full report to learn more.
-
Effective strategies for end-to-end supply chain risk management
By: Lumen
Type: Blog
This article can provide you with insight into effective strategies to manage end-to-end supply chain risks and how to identify and remediate third-party vulnerabilities. Additionally, you can discover how to enforce encryption practices, and implement a robust incident response plan. Read the full article to learn more.
-
Vendor Study – Software Defined Solutions and Services
By: Apcela
Type: Analyst Report
This ISG Provider Lens study examines the different kinds of global network offerings related to SDN. These include SD-WAN (consulting, implementation and managed services), SD-WAN (DIY) and equipment and service supply to enterprises for own operation. Read the study now to learn which could best fit your business’ needs.
-
30 top edge computing companies to watch in 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
With the amount of data organizations are generating today, IT leaders should consider edge computing technologies to keep all that data closer to the edge. In this infographic, we point out 30 vendors that are investing heavily in edge technologies to help organisations as they build edge computing ecosystems.
-
Network- software-defined solutions: Comparing providers
By: Comcast Business
Type: Research Content
SD-networks across all enterprise types are now ubiquitous in secure cloud-enabled implementations. This 47-page research report compares network- software-defined solutions and services provider, analyzing their strengths, challenges and competitive differentiators. Read on to learn more.
-
Key components of digital infrastructure to drive innovation
By: Orange Business Services
Type: Infographic
Une infrastructure digitale évolutive et sécurisée est essentielle pour l'entreprise numérique. IDC a identifié Orange comme leader grâce à son réseau mondial, ses services gérés et sa capacité à s'adapter aux exigences de souveraineté. Découvrez comment l'infrastructure numérique peut stimuler l'innovation et la croissance de votre entreprise.
-
Understand DDoS threats and protect your organization in 2024
By: Upstack, Inc.
Type: White Paper
DDoS attacks are on the rise, posing risks to organizations of all sizes. Learn the 3 crucial things to understand about this growing threat, including how it can complicate cyber insurance. Read the full white paper to protect your business.
-
A hybrid approach: How the conversation around cloud is changing
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise cloud migrations used to be discussed in absolute terms. In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.
-
Frost Radar : Managed Security Services in the Americas, 2024
By: AT&T and LevelBlue
Type: Analyst Report
Frost & Sullivan's analysis of the managed security services market in the Americas highlights the growth opportunities driven by the evolving threat landscape and the need for comprehensive security solutions. Read the full report to learn about leading providers and key market trends.
-
The rise of edge computing
By: TechTarget ComputerWeekly.com
Type: eGuide
The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
-
AI disruption: Challenges & guidance for data center design
By: Schneider Electric
Type: White Paper
Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
-
The AI Disruption: Challenges And Guidance For Data Center Design
By: Schneider Electric
Type: eBook
This eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.
-
20-page guide to Microsoft 365 Copilot
By: Converge Technology Solutions
Type: eBook
Whether to boost productivity, streamline workflows or unlock myriad other benefits, many organizations have adopted Microsoft 365 Copilot. For a guide to leveraging Copilot and tracking its success at your organization, tap into this 20-page e-book, "One Tool to Unify Them All."
-
Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.
-
Lumen unleashes productivity and joy with agile and Atlassian cloud
By:
Type: Video
With agile and Atlassian cloud, Lumen has focused, increased throughput by 200%, and reduced cycle times – leading to happier employees and customers. Challenge: After years of growth and acquisitions, Lumen’s technology firm had accumulated various development tools, instances, and processes, which resulted in less-than-ideal cycle times. Solution: Lumen began an agile transformation and cloud migration journey to standardize ways of working, deliver even more value in less time, and better support employees. Impact: With agile practices and Atlassian cloud tools (Jira Software, Confluence, Jira Service Management, Jira Work Management, Jira Align, Access) Lumen has become more focused, increased throughput by 200%, and reduced cycle times – leading to happier employees and customers.
-
How Lumen leverages Atlassian products through challenging organization-wide transformations
By:
Type: Video
TEAM '24: How Lumen leverages Atlassian products through challenging organization-wide transformations
-
MetriSight Ep. 13 - Carriers & CCaaS: What's the Value-Add?
By:
Type: Video
Metrigy's Robin Gareiss sits down with Lumen's Art Goldberg, senior manager, product management, for a chat on the role of the carrier for cloud contact center--beyond the platform.
-
Why Use a Carrier to Deliver Cloud UC and Contact Center Services?
By:
Type: Talk
There are no shortage of technology providers when it comes to cloud communications services. In addition to the specific provider selection, IT and business leaders must decide whether to partner directly with the platform provider or with a traditional network carrier (such as AT&T, BT, Lumen, or Verizon) to provide these capabilities through their own partnerships. This webinar explores the pervasiveness of using carriers, the benefits and disadvantages, and what providers are offering today.
-
5 steps to achieve UC network modernization for hybrid work
By: TechTarget ComputerWeekly.com
Type: eGuide
The enterprise communications and collaboration landscape continues to evolve as organizations shift from remote to hybrid work and as video becomes a critical business technology. Here are five network modernization tips to help you support current and future UC and collaboration needs.
-
Data Mesh: From Concept to Implementation
By:
Type: Video
Explore the nuances of implementing a data mesh architecture and overcome challenges, particularly in the context of legacy data pipelines, by adopting a modern approach that incorporates streaming data. This webinar offers insights from analyst Michele Goetz on best practices for building a data mesh and outlines principles for constructing enhanced data pipelines for this architecture, as shared by Mike Agnich, VP of Product at Confluent. Additionally, learn from Lumen's experience on leveraging streaming pipelines to implement a data mesh and architect a democratized data marketplace. Don't miss this opportunity to delve into the concept and real-life implementation of a data mesh—join us and bring your questions!
-
The development of wired and wireless LANs in a hybrid work model
By: TechTarget ComputerWeekly.com
Type: eBook
Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
-
CW ASEAN: Preparing for 5G
By: TechTarget ComputerWeekly.com
Type: Ezine
As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
-
The Dark Side of SD-WAN
By: Cato Networks
Type: Resource
There’s a glow on the upsides of SD-WAN, but there’s also a “dark side” that must be considered. Companies looking to SD-WAN to replace traditional MPLS have to learn how to design the middle and last miles of their SD-WAN to run reliably and with high availability. View this Cato Networks guide to learn how it’s done.
-
CW APAC, April 2021: Trend Watch: IoT in India
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
-
Jargon Buster Guide to Voice over IP (VoIP)
By: TechTarget ComputerWeekly.com
Type: eGuide
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
VoIP has never lost its voice: How to get the most out of your business communications
By: TechTarget ComputerWeekly.com
Type: eBook
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
-
Ultimate IoT implementation guide for businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
-
Warehouses & network management: Chart a journey
By: Ericsson
Type: Case Study
As Cradlepoint’s warehouse operations evolved, its networking needed to as well. In this case study, learn how the organization strengthened network visibility and security by leveraging a Cradlepoint solution.
-
CW APAC: Trend Watch - Internet of Things
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
-
CW APAC: Trend Watch: Cloud networking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
-
How to enhance your network for the future
By: TechTarget ComputerWeekly.com
Type: eGuide
The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
Hybrid cloud connectivity best practices
By: TechTarget ComputerWeekly.com
Type: eBook
No two hybrid cloud architectures are the same. Each implementation depends upon a business' specific needs and budget. Still, these practices can set up hybrid cloud connectivity without breaking the bank. In this infographic, we point out six best practices to set up an effective hybrid cloud network architecture.
-
Computer Weekly Buyer's Guide to SD-WAN services
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.
-
The sped-up deployment of IoT on the back of "failure free" 5G
By: TechTarget ComputerWeekly.com
Type: eGuide
Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid. In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
-
Top 10 networking stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
-
Wireless networks: A buyer's guide
By: TechTarget ComputerWeekly.com
Type: eBook
Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.
-
SD-WAN: Accelerating network transformation in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
SD-WAN: Accelerating network transformation in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
-
Modernizing your network: A journey to simplicity and agility
By: Cloudflare
Type: eBook
Evaluate the scope of your network modernization project, and consider key use cases like branch connectivity, protecting public-facing infrastructure, simplifying the corporate network, and connecting, and securing public clouds.
-
How you can improve IT efficiency with UCaaS and network security
By: Windstream Enterprise
Type: Case Study
A grocery retailer partnered with Windstream Enterprise to modernize its IT infrastructure. The solution included SD-WAN, managed network security and unified communications, resulting in improved connectivity, security and cost savings. Read the full case study to learn how Bargain Barn achieved its objectives.
-
The Ultimate Guide to Public Cloud: From Basics to Best Practices
By: TechTarget Cloud Computing
Type: eBook
A public cloud is a third-party managed platform offering global access to resources and services. TechTarget's comprehensive guide explores its history, benefits, challenges, and top services, plus insights on cost reduction, security, and comparisons with private and hybrid clouds.
-
Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
By: TechTarget ComputerWeekly.com
Type: Ezine
The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
-
The Inadequacy of Perimeter-Based Security in Today's Distributed World
By: Zscaler
Type: eGuide
Modern work environments are characterized by employees operating both inside and outside the office, using diverse applications hosted in the cloud, and accessing data from a variety of devices. This hyper-distribution of resources has widened the attack surface leaving perimeter-based security architectures ineffective against today's threats.
-
Cloud networking and CDN: How to get the best for your business
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).
-
A Computer Weekly e-guide to WAN & applications services
By: TechTarget ComputerWeekly.com
Type: eGuide
One of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).
-
A Computer Weekly Buyer's Guide to Internet of Things Security
By: TechTarget ComputerWeekly.com
Type: eBook
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.