Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

White Paper | Presented by ReliaQuest

Rethinking Security Automation: Six Best Practices to Improve Visibility & Accelerate Response

The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. Automation is supposed to solve the “tool fatigue” problem, surfacing the most critical issues by running playbooks against common threats and freeing up valuable resources for other tasks. However, expectations for automation have outpaced its capabilities to drastically reduce human intervention in security monitoring.

White Paper | Presented by Illumio

Decoupling Security from the Network: The Evolution of Segmentation

Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption.

White Paper | Presented by Illumio

How to Build a Micro-Segmentation Strategy

Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments.

Video/Webcast | Presented by Matillion

Addressing Today’s Data Challenges

Companies understand the value of data. But before data can be analyzed, it must be collected and prepared for analytics engines, and this process can be inefficient and costly. Moving data to the cloud can offer significant benefits, but only if done intelligently. In this webinar Kalyan Arangam, Solution Architect at Matillion, will be joined by Aaron Goldberg, contributing editor at IDG, to discuss today’s data challenges and how enterprises can optimize analytics by transforming data in the cloud.

Balance Legacy Data of the Past with Cloud Initiatives of the Future

Join Iron Mountain and AWS for a live webcast to learn how to balance the needs of inactive legacy data and production cloud data to accelerate and simplify your migration to AWS.

Miscellaneous | Presented by NowSecure

Closing the Mobile App Security and Privacy Gaps in Your Enterprise

The world around us has gone mobile. In just a decade, mobile app downloads grew from zero to 105 billion, and developers now outnumber security staff 100:1.

White Paper | Presented by Workfront

Successful Digital Transformation Requires Rethinking Work Management: IT Can Lead the Way

In this whitepaper, the reader will learn more about what solution can address managing enterprise work and how IT can—and should—lead the change. Also, find out more on the essential attributes of a modern work management platform, and the future of metrics, Artificial Intelligence, and machine learning to help businesses adopt modern platforms.

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

White Paper | Presented by Cylance

Threat Models and Methodologies

This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand.

White Paper | Presented by Cylance

Ransomware Remediation and Prevention

Ransomware is a form of extortionware that encrypts files in order to prevent victims from accessing their systems and data.

Load More