Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

...or search.
White Paper | Presented by Adallom

Adallom for AWS

The Adallom cloud application security platform for AWS allows IT organizations to: enable secure access of the AWS administrative console for the right users, address security and compliance mandates that requires attestation and reporting...

Advanced Threat Detection, Necessary but not Sufficient

The only thing worse than not detecting an advanced threat is detecting one, and still ending up in the headlines.

Content is King - Controlling Content in Your Enterprise

Read this white paper to learn an entirely new approach to controlling the flow of content without hindering your organization by using a cloud-based service that ensures discovery of sensitive content is a pain-free and simple process.

Defending against Advanced Threats: Addressing the Cyber Kill Chain

As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks.

eBook | Presented by Appirio

Mobile in the Enterprise: How to Build Your Way to Success

Enterprise mobile apps have the potential to increase worker productivity, improve customer relationships, and increase process efficiency, but those gains do not happen magically. Learn how to get started.

Security Analytics Pitfalls: Quick Patch or Long Term Solution?

It's almost impossible to avoid bombardment from vendors claiming their security analytics solutions are the next big thing. Using big data, smart algorithms, and other tools, these solutions can almost magically boost your security position.

White Paper | Presented by Samsung

Tablets are Transforming the Way Government Works

Frost & Sullivan research shows that the applications and devices that employees are using to do their jobs are increasingly designed to support a remote and virtual workforce management.

The New Phishing Threat: Phishing Attacks

The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Learn about the latest phishing trends.

White Paper | Presented by IBM

Advance Case Management: Empower the Knowledge Worker

A new report from Aberdeen Group shows how companies using ACM are achieving superior results in key measures such as staff utilization and quality of service levels by empowering employees with relevant and timely knowledge.

White Paper | Presented by Oracle

Agile Analytics in the Cloud - Oracle Business Intelligence Cloud Service

A solution that offers the power and breadth of enterprise-class analytics in an immediately accessible environment that is so friendly anyone in the organization can use it.

Load More