Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

A Proactive Approach to Cyber Attack Prevention

With 1,500 network security reviews under our belts using CDW Threat Check, we've learned a few things about how organizations can close up security loopholes. By offering this complimentary Threat Check assessment, our team of security analysts can passively monitor an organization's networks to identify vulnerabilities and malicious activity.

White Paper | Presented by WEI

Benefits of the Software Defined Data Center

With all aspects of the data center abstracted and working in unified cohesion, organizations can control costs, reduce costs of ownership, reduce IT complexity, increase availability and greatly enhance the agility of operations. This paper explores the benefits of SDDC which take business agility to a whole new level.

White Paper | Presented by CloudFlare

CloudFlare Advanced DDoS Protection

Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges.

Video/Webcast | Presented by CloudPassage

Comprehensive IaaS Security: A Holistic & Automated Approach

Leveraging real life examples and best practices, webinar speaker Andras Cser, VP, Principal Analyst at Forrester Research, will cover the challenges facing organizations as they secure their cloud infrastructure, and the latest trends and requirements for cloud infrastructure security.

Cybersecurity Resolutions

New Year's resolutions provide an opportunity to focus on important things that may have slipped through the cracks the previous year. While resolutions typically center on goals like losing weight or saving for that trip to Cabo San Lucas, IT managers can also use the New Year to rededicate themselves to improving their organizations' security hygiene.

White Paper | Presented by AllClear ID

Don't Let Your Security Strategy Become Irrelevant

A new report from Forrester Research says most security strategies do not align with overall business goals, and are in danger of losing credibility. Don't fall into this trap of irrelevance. Download the report and learn 6 steps your business can take today to build a more relevant security strategy that aligns with larger business goals.

Do You Follow Password Security Best Practices?

As part of its Penetration Testing services, the CDW Security Assessment team analyzes passwords - A LOT of passwords. Whenever we are able to obtain administrator privileges through our testing, which is most of the time on internal assessments, we perform an analysis of password security. We start the process by "dumping" the encrypted passwords from Active Directory, and then running them through tools like oclHashCat.

eGuide | Presented by RSA Security Inc

eGuide: The Need to Minimize Identity as a Threat Vector

This eGuide presented by Computerworld, InfoWorld, and Network World reports on the top cloud security threats and why cyber-security professionals are getting more involved in identity and access management. It also examines issues around single sign-on, identify-defined security, identity management and the continuous enterprise, and identity management in the cloud.

Case Study | Presented by AllClear ID

Find Out the Trust Cost of a Data Breach - and How to Prepare

The 2015 NetDiligence® Cyber Claims Study breaks down the costs associated with a data breach based on actual claims. Download the study today, and gain valuable insights into the costs associated with important crisis services.

White Paper | Presented by AllClear ID

Focus on Human Nature to Respond More Effectively During a Breach

Download this whitepaper, Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail a team during a crisis, and how to prepare to effectively address the human element in breach response

Load More