Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

How SOAR is transforming threat intelligence

This white paper talks about how Palo Alto Networks needs to transform threat intelligence by integrating it into an extensible SOAR platform enabling analysts to take full control over their threat intelligence combined with the power of proven SOAR capabilities.

Case Study | Presented by Sinch

IDC MarketScape: Worldwide Communications Platform As A Service 2021 Vendor Assessment

This IDC study assesses providers for clients to consider when looking to meet their CPaaS requirements.

Innovation Insight for Extended Detection and Response

We’re confident you’ll get a lot of value from Gartner’s: Deep dive into XDR product capabilities. Assessment of XDR benefits, uses and potential risks. Examples of use cases where XDR makes sense. Criteria for evaluating the different offerings.

Innovation Insight for Extended Detection and Response

We’re confident you’ll get a lot of value from Gartner’s: Deep dive into XDR product capabilities. Assessment of XDR benefits, uses and potential risks. Examples of use cases where XDR makes sense. Criteria for evaluating the different offerings.

Palantir Edge AI

This paper explores the three stages of edge AI sophistication: collect, learn and act. Learn how Palantir Edge AI is designed for every stage of this progression so that organizations are able to make AI-driven decisions at the edge.

Scaling Artificial Intelligence and Machine Learning Workloads

The business opportunities that can be achieved by investing in artificial intelligence (AI) technologies are exceptionally promising and potentially equally rewarding.

The Next Step for Next-Gen Antivirus

Cyberattacks are increasing in both scale and sophistication, and neither traditional antivirus nor next-gen antivirus is enough to protect modern enterprises. Stealthy adversaries can now launch zero-day exploits and fileless attacks, and they have the resources to develop and quickly modify malware.

The Ultimate Guide to MITRE

Read the new white paper, “The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation,” to learn: How the Round 2 evaluation worked and what was (and wasn’t) tested. How EDR vendors scored on number and quality of detections, correlation, user interface and more. How to use free tools to get your hands on the raw MITRE data and better inform your next EDR investment.

The Ultimate Guide to MITRE

Read the new white paper, “The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation,” to learn: How the Round 2 evaluation worked and what was (and wasn’t) tested. How EDR vendors scored on number and quality of detections, correlation, user interface and more. How to use free tools to get your hands on the raw MITRE data and better inform your next EDR investment.

Training and Inferencing with NVIDIA AI Enterprise on VMware vSphere

In this demo, we'll show some examples of the features and capabilities of this stack, as well as some example workloads, such as multi-node AI training, as well as multiple inferencing workloads.

Load More