Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Miscellaneous | Presented by LogMeIn

A Single Source for all your Enterprise Needs

Enterpise communications deployments need specific support - and pricing options. Here's a quick look at what you can expect from the team at GoToMeeting.

Miscellaneous | Presented by LogMeIn

5 Ways GoToMeeting Can Help You Connect Better

Professional, robust, reliable. GoToMeeting makes business collaboration a better experience – no matter the distance. We support millions of meetings a year, helping businesses of all sizes look and sound their best.

Miscellaneous | Presented by LogMeIn

The Hidden Cost of [Free] Meeting Software

With so many web conferencing tools to choose from, how do you pick one? Freemium options may seem like a good start, but they often end up costing you more.

Miscellaneous | Presented by IBM

Database Security: KuppingerCole Leadership Compass

Database security protects databases against compromises of their integrity, confidentiality and availability.

Miscellaneous | Presented by IBM

Database Security: KuppingerCole Leadership Compass

Database security protects databases against compromises of their integrity, confidentiality and availability.

ITAD: Your Lifeline to Compliance in Healthcare

IDG recently surveyed IT decision-makers at healthcare organizations to understand what their top concerns are when it comes to IT asset disposition (ITAD) and their plans for meeting those challenges. See the results in this infographic.

Infographic: Are you Disposing of IT Assets Securely?

IDG recently surveyed IT decision-makers at financial services organizations to understand what their top concerns are when it comes to IT asset disposition (ITAD) and their plans for meeting those challenges. See the results in this infographic.

Miscellaneous | Presented by FireEye

All It Takes is ONE

Email is the most popular vector for cyber attacks. See recent findings from the analysis of over a half billion emails so you can better protect your organization.

Miscellaneous | Presented by IBM

Breaking the rules of cloud migration

Learn about critical success factors for the journey to cloud and how VMware and IBM HCX solution along with IBM Cloud Migration Factory; process, methods and tools deliver predictable results and accelerate your journey to the cloud.

Miscellaneous | Presented by FireEye

Email Threat Report

- One in every 101 emails are malicious - Tax season sees an increase in attacks - Impersonation attacks are more commonly used For more information like this, read our free Email Threat Intelligence report which includes findings from analyzing over a half billion emails.

Load More