Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Citrix Systems

Citrix XenDesktop and XenApp Runs on Nutanix Acropolis

Learn about how Nutanix hyperconverged infrastructure (HCI)-built on Nutanix Acropolis-and with Citrix XenApp and XenDesktop provide a complete, fully supported solution for application and desktop virtualization that enhances enterprise security, enables workforce mobility, and lowers the cost and complexity of application, desktop, and infrastructure management by as much as 70%.

White Paper | Presented by Citrix Systems

Citrix XenDesktop on Acropolis Hypervisor

Citrix XenDesktop on Nutanix is a powerful solution which offers unrivaled user experience, simple administration and web-scale flexibility and economics.

Closing the Skills Gap

35% of the open positions in cybersecurity can't be filled today because there are not enough skilled candidates. There are too many threats, hiding amid too much data, leading to overworked analysts unable to focus on what matters most. Automated analytics can empower your existing security analysts to work more effectively on more complex tasks - essentially closing the skills gap. Find out how.

Data Breaches and The Great Security Disconnect

The growing sophistication and fast-evolving nature of cyberthreats have made data breach preparedness a critical issue for enterprises. View our interactive infographic to learn the surprising statistics and how you can adjust.

eGuide | Presented by RSA Security Inc

eGuide: New Era of Identity Management

This eGuide from CSO and Network World discusses why enterprise organizations must make identity management an essential component of business processes and security, how security requirements are driving identity management, and where IAM is headed.

Forrester Report: Security Analytics is the Cornerstone of Modern Detection and Response

If your organization relies on traditional SIEM for threat detection, discover what Forrester research revealed about the capabilities of traditional SIEM, and why it's critical to augment with security analytics for rapid cyber threat detection and response before the breach.

Forrester Wave Security Analytics

In their 36-criteria evaluation of security analytics (SA) providers, Forrester identified the 11 most significant ones and researched, analyzed, and scored them. Download this report to see why RSA was named a Leader and how SA solutions enable security and risk professionals to detect, investigate and respond to cybersecurity threats.

Frost & Sullivan Best Practices Research: Network Security Forensics

Gain insights on what constitutes leadership in network security, based on extensive research conducted by Frost & Sullivan. You'll see industry challenges, key benchmarking criteria and a scorecard. Read the report now to see how to gain advantages for your security team with best practices and key capabilities requirements.

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection

Read this IDC Technology Spotlight to explore the key capabilities of modern endpoint security technologies in the market. See why enterprises are choosing solutions containing more sophisticated detection and deeper forensics capabilities to enable incident responders to execute faster triage and investigations. Access this in-depth analyst report for insights on responding to endpoint threats in minutes.

KingSlayer - A Supply Chain Attack

RSA Research investigated the source of suspicious, observed beaconing thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on a software supply-chain involving a Trojan inserted in otherwise legitimate software. Get details of this attack as well as mitigation and detection strategies.

Load More