Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Coresite

How to Connect your Private and Public Clouds

Building a hybrid cloud solution is not easy. Watch the whiteboard demo to learn how colocation allows you to access all of your providers in a single location in order to reduce costs and improve performance.

Resources/Tool | Presented by Coresite

The Colocation Calculator

Our Colocation Savings Calculator is a tool designed to provide clarity around the cost of managing data in-house vs. trusting it to a 3rd party. Will the switch be cost-effective? Enter your requirements and see how much colocation can save you.

4 Countermeasures to Protect Against Ransomware

By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment of a ransom, typically with untraceable bitcoin as the currency of choice.

eGuide | Presented by Citrix Systems

Managing Security and Third-Party Risk

With every technology advance and business in-novation, the security professional's job descrip-tion gets bigger. Cloud and mobile computing have expanded the boundaries of what the enter-prise needs to protect, and third-party partners and supply chain vendors create additional threat exposure points for today's digital businesses.

Security Metrics for Threat Management

9 security experts share lessons learned, best practices and key security metrics that help with threat management.

Security Metrics That Drive Action in Financial Services

Security experts share lessons learned, best practices and key security metrics that drive action in Financial Services.

Security Metrics That Help Boards Assess Risk

11 security experts share lessons learned, best practices and key security metrics that help Boards assess risk.

Security Metrics That Tell a Story to the Board

7 security experts share lessons learned, best practices and key security metrics that tell a story to the board.

The Reign of Ransomware

The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation.

Video/Webcast | Presented by CloudPassage

The True Security Risks of IaaS: Don't Worry About The Wrong Things

As more organizations are moving their applications to be hosted with various Infrastructure as a Service providers, security teams have a whole new list of security concerns. But are those worries warranted?

Load More