Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by PwC

5 key questions when you’re facing a potential breach

Leading companies — even top cybersecurity firms and government agencies — can be vulnerable to sophisticated threat actors. Check out these five key questions that CEOs and boards should be discussing with their CISOs and CIOs.

Sponsor Article | Presented by PwC

Cyber insurance: 6 questions every CEO, CFO and board will inevitably ask — soon

Knowing which questions to ask about cyber insurance can be its own kind of insurance - one that helps prevent you from making the wrong choices. Learn more here.

Sponsor Article | Presented by PwC

Cyber risk quantified. Cyber risk managed.

Quantifying the financial risks of different cyber threats can increase the bang for the cyber buck: it enables you to direct resources to the greatest risks.

Sponsor Article | Presented by PwC

Does your customer identity and access management (CIAM) inspire trust?

Security and marketing, previously considered strange bedfellows, are a match made in digital heaven with consumer identity and access management (CIAM). Read on to find out why.

ESG Technical Validation: Protecting Critical Data from Cyber Threats

This ESG Technical Validation documents hands-on validation of the Dell EMC PowerProtect Cyber Recovery solution with CyberSense from Dell Technologies.

Analyst Report | Presented by Zimperium

GigaOm’s Radar for Phishing Prevention and Detection, 2020

Download the report to read more and see where Zimperium and 13 other vendors were mapped by GigaOm.

Analyst Report | Presented by Zimperium

IDC MarketScape: Worldwide Mobile Threat Management Software, 2020 Vendor Assessment

Download Zimperium's excerpt from the IDC MarketScape: Worldwide Mobile Threat Management Software, 2020 Vendor Assessment and learn why Zimperium is considered a MTM leader.

Sponsor Article | Presented by PwC

In data we trust: living up to the credo of the 21st century

Data is everything because it is turning business models upside down, while guiding the world through its health and economic challenges. It is not enough, because it is worse than useless—it is a source of risk—unless you can trust it. The answer to this challenge is a data trust strategy: one that simultaneously maximizes data’s ability to create value and minimizes its capacity to destroy it.

Sponsor Article | Presented by PwC

Jump-start your cloud adoption with modern cloud security

Do you feel stuck with your enterprise cloud transformation strategy? A well-thought-out, step-by-step approach to security can jump-start your stalled migration and/or modernization. Learn more here!

White Paper | Presented by IBM

KuppingerCole Report Leadership Compass Database and Big Data Security

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements.

Load More