Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

How to Derive Optimal Value from a Supply Chain Control Tower

This tech brief looks at the major forces influencing the supply chain today, and what a control tower needs to meet the demands of today’s fast moving global supply chains.

Sponsor Article | Presented by SoftChoice

5 Reasons to Get VMware Licensing Right

Optimizing software investments isn’t exactly the most exciting topic for IT or the business. But that’s not to say it isn’t an important one. From cutting costs to enabling your biggest, most ambitious digital transformations, picking the right licensing model is an important step. With more businesses heading to hybrid IT and virtualization, we explored the core benefits of VMware licensing’s biggest agreement for today’s enterprise.

Sponsor Article | Presented by Google

Google named a leader in the 2018 Gartner Infrastructure as a Service Magic Quadrant

For this Magic Quadrant, Gartner evaluated the cloud providers offering infrastructure as a service. Google is proud that Gartner identifies Google as one of only three Leaders in this market.

Sponsor Article | Presented by Google

Google named a leader in The Forrester Wave: Public Cloud Platform Native Security

We are honored that The Forrester Wave: Public Cloud Platform Native Security Wave Q2 2018 report names Google Cloud a Leader. The report evaluates the native security capabilities and features of public cloud providers, such as encryption, identity and access management (IAM) and workload security. Of the seven vendors, Google Cloud scored highest for strategy.

Enterprise plans for security automation and orchestration

Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks.

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event and case management, and reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a place in the modern securities operation center.

Automating and orchestrating security operations (and saving $1 million per year)

Learn how one organization automated phishing investigations to build a business case for security automation and orchestration.

Sponsor Article | Presented by Samanage

Blending business strategy and ITSM for transformational value

Aligning organizational strategies with IT service management is a problem that needs solving, according to the latest research. The task relies on the C-suite, the CIO and the IT organization to collaborate and adopt the best practices that will deliver real value from digital transformation.

The evolution of security operations, automation and orchestration.

The basic functionality of these products is being supplemented with strong integration, canned runbooks, and case management.

Getting Ready for Blockchain

Despite the buzz surrounding Blockchain, there is still an abundance of confusion on what exactly Blockchain is. These interviews with business leaders not afraid of cutting-edge technologies, shed light on why Blockchain is so important, how artificial intelligence (AI) is bringing real value to businesses, which industries are ripe for AI, and how to prepare your business to take full advantage these technologies.

Load More