Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Video/Webcast | Presented by TrustMAPP

Understanding Trust and the Economics of Insecurity

Cyber security is at a pivotal moment in history where more products are available to security teams than ever before yet investments in more cyber security products and services alone does not align a fiscally responsible team with an adequate security posture.

Video/Webcast | Presented by HELPSYSTEMS

Balancing Security Priorities with User Efficiency

Organizations face a unique balancing act when it comes to user access. On the one side, they require access to organizational systems and data in order to successfully do their jobs.

Compliance is More Critical Than Ever

Efficient and effective compliance management protocols are an absolute requirement in financial services

2018 Annual Cybersecurity Report At-A-Glance: Cloud Security

The Cisco 2018 Annual Cybersecurity Report for Cloud Security examines the techniques and strategies that adversaries use to break through defenses and evade detection. Get the at-a-glance report for cloud security.

Video/Webcast | Presented by Sophos

7 Uncomfortable Truths of Endpoint Security

Join this webinar to discover what 3,100 IT managers had to say when it comes to endpoint security.

Adapting Performance Visibility to New Technology Trends

For a variety of reasons, many new technologies cut off performance visibility. What can enterprises do to protect it?

Apple vs. Dell: A Workstation Buyer’s Guide

When buying a workstation, price-performance matters. But it’s not the only consideration. Also important is aligning features and capabilities with user software applications and workloads. So are system optimization, expandability, reliability and support. While many buyers—especially for graphics, video and multimedia fields—might consider Apple’s iMac, iMac Pro and MacBook Pro models, they may be selling themselves short in many ways. This paper provides a checklist for buyers to compare Apple’s newest high-end offerings with the latest Dell Precision workstations.

White Paper | Presented by Cisco Systems

Are you getting what you were promised?

People make a lot of claims about network security. We’d rather show you proof. If you're looking for speed, reliability, advanced intelligence, and ease of integration with your existing environment, there's only one secure internet gateway that you can build your entire business on: Cisco Umbrella. Check out our infographic to learn just how quickly and easily you can put Cisco Umbrella to the test in your environment.

At-A-Glance: Cisco Umbrella: Reporting You Can Count On

Deploying a Cisco Umbrella free trial is simple. But to get the most out of your trial, after you’re up and running, these three reports are a great place to start, since they give you a more complete picture of the security risks within your organization.

Video/Webcast | Presented by Sophos

Phishing – The Greatest Secret

Download this webinar to learn about the dark world of phishing and how you can fight back with Sophos Phish Threat.

Load More