Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

Magic Quadrant for Cloud Infrastructure as a Service, Worldwide

The market for cloud IaaS has consolidated significantly around two leading service providers. The future of other service providers is increasingly uncertain and customers must carefully manage provider-related risks.

Navigating the Digital Journey with SAP and the Cloud

A key step in digital transformation is the smooth transition of mission-critical applications such as SAP to the cloud. In this article from SAPinsider, learn how leading enterprises have migrated their SAP workloads to the AWS cloud, and are realizing greater efficiency and agility.

Simple AWS Networking with Application Defined SD-WAN

The Amazon Web Services (AWS) Cloud is a proven route to help organizations achieve rapid scalability, reduced time-to-market, and cost-effectiveness in their IT infrastructure. These benefits are delivered, in part, by automation, greater ease-of-use, and simplified management.

eBook | Presented by Riverbed Technology

Stairway to Cloud Networking Nirvana

Migrating to the Amazon Web Services (AWS) Cloud enables organizations to realize greater business agility and lower operational expenditures. However, using legacy network management solutions can leave you with poor agility. Learn how Riverbed and AWS can fundamentally change the way you manage networks and get the most out of your AWS environment.

Emerging Trends in Vulnerability Management

Vulnerability management has historically been treated as an engineering task without any true consideration for how vulnerabilities relate to the business and to real world threats, resulting in haphazard and inefficient practical management strategies.

2016 Malware Year in Review: Tricks, Threats, and Triumph

Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware. Now more than ever, it has become more important to detect and interdict malware during the delivery phase.

2016 Year in Review Malware Infographic

An at-a-glance 2016 Year in Review Malware Infographic, with a close look at the fastest-growing attack vector of the past year: Ransomware. PhishMe's research team found that the explosive growth of ransomware was the most significant trend of 2016. The extraordinary increase in the number of ransomware attacks made destructive malware a fixture on the threat landscape.

Data Breaches and The Great Security Disconnect

The growing sophistication and fast-evolving nature of cyberthreats have made data breach preparedness a critical issue for enterprises. View our interactive infographic to learn the surprising statistics and how you can adjust.

Video/Webcast | Presented by CDW | EMC

Digital Transformation Calls for New Data Center Solutions

We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation.

White Paper | Presented by Sophos Inc

Don't Take the Bait: Phishing is big business. Don't get hooked.

Phishing attacks have seen a meteoric rise in the last year as attackers continue to refine their tactics and share successful attack types. In particular, they've taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks.

Load More