Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

White Paper | Presented by Microsoft

Cloud Lessons Learned: Four Companies That Migrated Their Windows Server and SQL Server Workloads to Azure

Read the success stories of companies that increased workload performance and cut costs by moving Windows Server and SQL Server to Azure. Download this e-book to learn about the different cloud migration paths that Allscripts, Carlsberg Group, Epos Now, and TraXall France used—and see how Azure helps to:

The Top 4 Things to Look for in a Customer Identity and Access Management (CIAM) Solution

We live in a world where hackers are constantly trying to exploit vulnerabilities in websites and mobile apps.

Digital Identity Security Assurance

Customer identities are among your company’s most critical and valuable assets. Securing these digital identities, and ensuring ongoing business value from the associated data, are crucial for business success.

White Paper | Presented by CENTURYLINK

How a Software-Defined Network Advances Digital Transformation

To facilitate digital transformation, most businesses are focused on ways to improve IT efficiency and productivity, provide instant network control, enhance application speed and performance, and mitigate security risks.

eBook | Presented by CyberArk Software

5 Reasons to Prioritize Privileged Access Security

Establishing cyber security priorities can be difficult for security practitioners and there is confusion around what to do to get the most effective protection against cyber attacks.

6 Principles of Modern Change Data Capture: How to Build Fast, Agile, Reliable Data Pipelines

Watch this on-demand webinar from EMA Research and Equalum to get practical insights into six foundational principles of streaming change data capture that guide your modernization journey.

A Frictionless Approach to Endpoint Protection

A Financial Institution overwhelmed with the administrative privileges sprawled across their end-user environment needed a solution which would reduce the attack surface these network entry points exposed without affecting the strict Service Level Agreement’s (SLA’s) they have with their customers.

Video/Webcast | Presented by OutSystems

Agile Best Practices for Remote Teams

In today’s virtual work environment, Agile teams must adapt their strategy to meet the needs of global teams.

eBook | Presented by CyberArk Software

Better Endpoint Security Improved Security and Lowers Operational Costs

CyberArk conducted a survey with nearly 100 IT and security professionals already using the CyberArk Endpoint Privilege Management (EPM) solution to protect Windows and macOS endpoints.

BluePrint for PAM Success

In an age of accelerating breaches and threats, Privilege Access Management success is a top priority for most organizations. Learn about common PAM challenges and how CyberArk Blueprint can help organizations improve privileged access management systems and practices, reduce security vulnerabilities and mitigate risk.

Load More