Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

Identity and Access Management Trends During COVID-19

Hitachi ID and Pulse surveyed 100 CIOs to uncover the biggest remote working roadblocks their teams have dealt with, and how leaders are reprioritizing accordingly.

Secure Remote Access for Vendors

Now is a good time to check up on your vendor security.

Leveraging AI and Automation to Navigate a Global Pandemic Crisis

Artificial intelligence (AI) and machine learning (ML) tools can enhance an enterprise’s ability to prioritize application delivery and maintain business continuity when resources and staff become decentralized. IDG interviewed two experts to learn their perspectives on leveraging AI and automation to navigate the COVID-19 crisis.

White Paper | Presented by ServiceNow Inc

ThinkJar: Six Transformational Customer Service Trends

Discover how to make the most of the trends to deliver great experiences for everyone involved in your customer service.

eBook | Presented by Palo Alto Networks

Unit 42 Cloud Threat Report, Spring 2020

For the Spring 2020 edition of the Unit 42 Cloud Threat Report, the team of elite cloud threat researchers uncover where cloud vulnerabilities are surfacing in infrastructure as code (IaC) templates, as well as providing a deep dive into cryptomining operations and broader cybercrime trends.

eBook | Presented by Palo Alto Networks

The Business Case for Cloud Threat Defense

This report provides an overview of the practical benefits of Prisma Cloud, one such cloud native security product, along with a prepared cost/benefit analysis.

The Continuum of Cloud Native Topologies

This white paper offers a model for viewing the different technologies as a continuum to address different scenarios, which can help when choosing which combination of technologies work best for running different workloads.

eBook | Presented by Palo Alto Networks

Container Security 101

This e-book explores the fundamentals of container security, and explains clearly what every organization needs to know about images, registries, orchestrators and more.

Best Practices to Optimize and Secure Your Trading Infrastructure

Do you have the insights into the effectiveness of your current security posture and actionable intelligence to improve it?

4 Things You Need to Secure Your Hybrid Cloud

In this session, we will talk about four key things to keep in mind when building your hybrid cloud security posture. We’ll also be joined by Doug Cahill, vice president and group director at ESG, to talk about how to best secure the growing number of cloud native applications that many network security teams are tasked with protecting.

Load More