Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

Optimize Flash Storage with Predictive Insight

Today's flash storage is predictive, analytic and prevents storage problems before they happen. Read this white paper to learn how HPE 3PAR StoreServ solves 86% of storage problems and works with HPE ProLiant DL380 Gen10 Servers, powered by Intel® Xeon® Scalable processors to safeguard data.

Video/Webcast | Presented by ObserveIT

Spies Among Us: Defending Against State-Sponsored Insider Threats

This briefing will discuss the emergence of nation state-sponsored global talent recruitment platforms, the growing threats these information-hunting efforts represent, and how to mitigate the associated risk for your organization. Don't miss it 4/26/18 @ 11:00 AM EDT.

The Printing Gap in Enterprise Cybersecurity

Print security is a vulnerability that often goes unnoticed, even though 61% of enterprises admit they've suffered a printer-related breach.

White Paper | Presented by BMC Software

4 Steps to Patch Management Success

The need for patch management has been demonstrated repeatedly in recent years as companies large and small suffered data breaches due to unpatched vulnerabilities. The challenges are significant, but not overwhelming, with these four steps.

eGuide | Presented by Veritas

eGuide: A Data Protection Toolkit

Data protection is one of the most formidable challenges facing organizations today. Ransomware attacks that restrict access to important data until the attacker is paid are becoming increasingly common. Moving to the cloud is an option, but it's still important to have a disaster recovery plan in hand. And what about DRaaS? This toolkit aims to offer some ideas for grappling with data protection and disaster recovery.

White Paper | Presented by BMC Software

Is Patching Dead or Alive?

Just about every software company now issues patches and updates for their products in order to keep software secure and efficient. But patching, while necessary, is often a challenge for organizations because of the high volume. Tech influencers weigh in on whether patching is dead or alive and how they think businesses should handle the process today.

White Paper | Presented by BMC Software

(Lack of) Patch Management Highlighted in Congress

According to the former Equifax CEO's testimony to Congress, one of the primary causes of this now infamous data breach was the company's failure to patch a critical vulnerability. Secure IT operations start with the identification and prioritization of these vulnerabilities. Read how here.

eBook | Presented by Iovation

Multi-Factor Authentication for Dummies

This book introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime

White Paper | Presented by BMC Software

Patching in a Hybrid Cloud World

Anthony Bryce, director of product management for BMC Digital Service Operations, discusses why patching still matters and how do it right in an era of complex, hybrid cloud infrastructures.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations.

Load More