About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

ThreatBook Honored as a Sample Vendor in Gartner® Hype Cycle™ for Security Operations

By: Get News

ThreatBook, a leading provider of cyber threat detection and response that is driven by TI (Threat Intelligence) and AI, has been named as a Sample Vendor for the Threat Intelligence Products and Services category in the Gartner® Hype Cycle™ for Security Operations, 2024 report.

Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. The five phases of a Hype Cycle are Innovation Trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment and the Plateau of Productivity.

According to the report, the TI is in its "Mature mainstream" stage. TI services provide organizations with relevant context and insight about the cyberthreat landscape by documenting tactics, techniques and procedures; and by profiling attack campaigns, threats and threat actors. TI products deliver tools to assist organizations in aggregating, collecting, curating and operationalizing their own TI and potentially sharing it with outside entities.

Why it is important, the report said, "Security leaders have an obligation to understand the organization’s threat landscape.They must ensure their security solutions are updated with the latest threat content andprovide contextual information to their teams as it helps inform overall risk. TI provides the means for an organization to maintain visibility of its threat landscape and buildtimely, accurate and actionable insights that can be applied before, during and after threats present themselves to the organization."

Over the years, ThreatBook has built a cloud-based, all-domain, automated system capable of processing hundreds of terabytes of data daily, supporting the production, management and sharing of more than ten types of threat intelligence. In terms of coverage, ThreatBook continuously profiles and tracks nearly 300 hacker organisations worldwide, providing real-time updates on global security events. In terms of accuracy, it uses a rules+AI model to establish a fine-grained false positive mechanism for different asset types, achieving an intelligence accuracy rate of 99.99%.

"Our Threat Intelligence SaaS API has over 10 APIs that enable flexible integration of intelligence to improve threat visibility and operations," said Chase Li, co-founder of ThreatBook. "With cutting-edge AI and a global threat intelligence repository, we believe we can help SecOps teams work more efficiently to detect compromises and reduce alert noise."

About ThreatBook

ThreatBook, founded in 2015, is a leading provider of cyber threat detection and response. We pioneered new approaches to deliver high-fidelity, efficient and actionable security intelligence and integrated the ability with full life cycle threat detection system and incident response capabilities to empower the protection on cloud, network and endpoints, help enterprises achieve high efficiency of responding to threats, reduce complexity and improve security operations.

Disclaimer: GARTNER is registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Media Contact
Company Name: ThreatBook
Contact Person: Evan Liao
Email: Send Email
City: Singapore
Country: Singapore
Website: https://www.threatbook.com



Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.