Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

White Paper | Presented by McAfee

Five Ways to Rethink Your Endpoint Protection Strategy

Device security is no longer about traditional antivirus versus next-generation endpoint protection.

Miscellaneous | Presented by McAfee

Cloud Access Security Broker— Request for Proposal Questions

Download the latest CASB MQ report that evaluates the top 13 CASB vendors based on ability to execute and completeness of vision.

Sponsor Article | Presented by McAfee

Magic Quadrant for Cloud Access Security Brokers

Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud.

How Managed Print Services Deliver Real-Time Threat Protection

Read this brochure to learn how managed print services (MPS) — such as HP Secure MPS — provide real-time threat protection across print environments.

White Paper | Presented by IBM

5 Epic Fails in Data Security

Data security is on everyone’s mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cybercriminals.

Miscellaneous | Presented by IBM

Data Risk Management in 2018: What to Look for and How to Prepare

This paper examines the requirements and outlines the insights that security practitioners need.

White Paper | Presented by IBM

Elevate your Game: Take Data Security to the Next Level

This paper describes the roadblocks that organizations may face as they seek to take their data security and compliance efforts to the next level.

Miscellaneous | Presented by IBM

Forrester Cloud Microsite: Security Should Travel With Your Cloud Data

As a best practice approach to make sure sensitive data is protected wherever it resides, organizations should look to centralize data security and protection controls in private and public cloud environments, as well as in the rest of the enterprise, and ensure a segregation of duties so that data administrators don’t also become security administrators or auditors.

Miscellaneous | Presented by IBM

Forrester Consulting: Is Your Company In Peril If Critical Data Is Breached?

Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives.

Data Sheet | Presented by IBM

How to Avoid Epic Fails in Data Security Battlecard

There is nothing easy about securing sensitive data to combat today’s threat landscape, but companies can take steps to ensure that they are devoting the right resources to their data protection strategy.

Load More
Popular Resources