Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

...or search.
White Paper | Presented by Neustar Inc

4 Ways Neustar Strengthens Your DNS Security

There are steps that can be taken to protect DNS, lower business risk, and defend your brand.

Superguide | Presented by CDW

5 Steps to Better Virtual Meetings

Today's virtual meetings let customers connect with your experts despite distance and help you feel like you're in the same room as colleagues from around the world. Here are five ways to make your virtual meetings more productive and impactful.

Case Study | Presented by Adallom

Adallom for Box

While Box invests heavily in security, its CMS introduces unique risks to an organization. Under the shared responsibility model, organizations need to take a proactive approach to securing their data in Box.

Presentation | Presented by Lenovo

An IT Survival Guide: Big Chaos in Small Packages

Download the Survival Guide: Users Happen "Big Chaos in Small Packages," sponsored by Microsoft and Lenovo, to discover common at-home risk factors and how they can be addressed.

Presentation | Presented by Lenovo

An IT Survival Guide: Tales of the Unbelievable

Things like gravity, rain, and walking are too much for some users to process when it comes to proper care of technology.

Presentation | Presented by Lenovo

An IT Survival Guide: The Great Perils of Travel

Stay connected at all times, whether at the office or on the go, with agile, durable, and flexible devices like the Lenovo ThinkPad Yoga 12 with Windows 8.1 Pro.

Presentation | Presented by Lenovo

An IT Survival Guide: Users vs. Their Environment

Download the Survival Guide: Users Happen "Users vs. Their Environment," sponsored by Intel and Lenovo, to understand the risks users face in today's environment and how to mitigate those risks.

Application-first Approach Taking Hold in Europe

This report reveals survey data on how European IT leaders are prioritizing applications for external management and highlights selection criteria to ensure that a potential partner takes a truly application-first approach.

White Paper | Presented by CDW

Cisco Unified Contact Center Enterprise 9.0

As part of the Cisco Unified Communications Solutions portfolio, Cisco Unified Contact Center solutions create the foundation for positive customer service, a critical factor in building a stronger business.

White Paper | Presented by Adallom

Cloud Usage Risk Report

Unfortunately, Google, Salesforce, Box etc. aren't accountable for the security posture of your organization or its employees. Enter the shared responsibility model. Companies are responsible for employee activities & data, even in the cloud.

Load More