Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Video/Webcast | Presented by PhoenixNAP

Accelerating Specialized Workloads with Next-Gen Processors

The challenge created by digital disruption — too much data — has also created an unprecedented opportunity.

Low-Code Development: The Key to Delivering a Better Digital Citizen Experience

Good government means delivering to citizens a great online experience. A new IDG Research survey explores the goals of state and local governments and the obstacles they face as they seek to better serve citizens online.

5 Endpoint Protection Best Practices

Attackers must complete a certain sequence of events, known as the attack lifecycle, to successfully accomplish their objectives, whether stealing information or running ransomware. To be successful, nearly every attack relies on compromising an endpoint, and although most organizations have deployed endpoint protection, infections are still common.

Global Hybrid IT Trend: The Race to Connect the World Webinar

In this presentation, we will obtain global perspective from Dan Thompson and Daniel Bizo from 451 Research as well as global executives from Iron Mountain Data Centers.

Video/Webcast | Presented by Gigamon

Fuel Visibility and Automation in Today’s Hybrid Cloud Environments

Today’s networks are changing with the rise of third-party platforms, including cloud, mobile, social, big data and IoT, causing organizations to implement new tools. What are you doing to keep up with the adoption of modern networks and the challenges they pose from an operational perspective?

Video/Webcast | Presented by Neustar

DDoS Defense: What You Need to Know

DoS attacks are a real and present danger. Attacks are increasing in number, size and intensity -- your organization could be next.

Video/Webcast | Presented by Pulse Secure

2019 State of Enterprise Secure Access; enabling multi-cloud and Zero Trust

Join this IDG research-based webcast and to understand the extent of hybrid IT secure access challenges, threats, initiatives, practices and technologies.

Video/Webcast | Presented by Pulse Secure

2019 State of Enterprise Secure Access; enabling multi-cloud and Zero Trust

Join this IDG research-based webcast and to understand the extent of hybrid IT secure access challenges, threats, initiatives, practices and technologies.

Video/Webcast | Presented by WSO2 Inc

API Management in Service Mesh Using Istio and WSO2 API Manager

In this webinar, we will discuss how to augment service mesh functionality with API management capabilities, so you can create an end-to-end solution for your entire business functionality — from microservices, to APIs, to end-user applications.

The State of the CASB Market

In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions.

Load More
Popular Resources