Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

eBook | Presented by ServiceNow Inc

5 Steps to Successfully Deploying a Healthy CMDB

Get a detailed roadmap for successfully deploying your CMDB with this guide. Get started on the road to improved business service health today.

White Paper | Presented by ServiceNow Inc

Configuration Management Database

This whitepaper provides you with the fundamentals to help ensure your configuration data management project with CMDB is a success.

eBook | Presented by ServiceNow Inc

Populate and maintain your CMDB with ServiceNow Discovery

Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.

Forrester TEI study 2019: The Total Economic Impact of ServiceNow IT Applications

Forrester Consulting determined the Total Economic Impact™ of IT applications—and ServiceNow believes that the results were impressive. The study delivers a framework to evaluate the real world customer experience and economic impact of switching to ServiceNow. Download now.

Accenture IDC infobrief: Using AIOps and Cognitive Patterns to Optimize Operations

A well-executed AIOps strategy can help deliver high-performance business outcomes through agility and speed to innovation.

White Paper | Presented by ServiceNow Inc

Configuration Management Database for Dummies iPaper

This ipaper provides you with the fundamentals to help ensure your configuration data management project with CMDB is a success.

Maximize the ROI of Detection & Response

Advanced attackers can evade detection and stay under the radar by stealing credentials and masquerading as legitimate users. In response, security teams today must deploy multiple – often siloed – detection and response tools.

eBook | Presented by Palo Alto Networks

Elements of Security Operations

Elements of Security Operations dives into best practices on how to build a better SOC. Learn step by step how to make your security operations more effective, consistent and poised to tackle future threats.

How to pick a winner in EDR

As your enterprise faces more frequent targeted attacks, you need a more effective approach to detect malicious activity, inform your threat hunting and understand attacker behavior.

eBook | Presented by ServiceNow Inc

Where is IT today?

Business transformation is essential for an organization to stay competitive in today’s market. And IT can be an important partner in the transformation.

Load More