Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

eBook | Presented by IBM

Deliver a business-ready data pipeline with DataOps

An introduction to the IBM DataOps methodology and practice

eBook | Presented by Box

Hope is NOT a strategy: Secure your content in the cloud with Box.

Seems like every week there's news of another security breach. Ponemon Institute has found that the typical data breach costs an average of $3.9 million, and that just one breach can decrease your company's stock price by 5%. No one wants to be that kind of typical. So what can you do about it?

eBook | Presented by Box

Hope is NOT a strategy: Secure your content in the cloud with Box.

Seems like every week there's news of another security breach. Ponemon Institute has found that the typical data breach costs an average of $3.9 million, and that just one breach can decrease your company's stock price by 5%. No one wants to be that kind of typical. So what can you do about it?

eBook | Presented by Philips Healthcare

Health Cloud Strategic Playbook

Cloud-based healthcare services are gaining acceptance. Calls for increased patient engagement via web-based applications strain traditional resources.

eBook | Presented by ServiceNow Inc

Game plan: building a modern finance organization

This eBook by Deloitte and ServiceNow serves as a guide for finance leaders on how they can build a modern finance organization that is future‑ready.

eBook | Presented by ServiceNow Inc

The Future of Accounting is Now

This ebook by CFO.com and ServiceNow examines how finance organizations can modernize with the proper technology, people, processes and strategy in place.

eBook | Presented by Hyland Software

Six Digital Transformation Strategies for 2020 and Beyond

Analyst insights on digital transformation technology and market trends.

10 Tools every developer should have when working with PostgreSQL

This article lists 10 open source tools to help developers working with PostgreSQL.

5 Essential Elements of a Comprehensive Endpoint Security Strategy

Read our new “Five Essential Elements of a Comprehensive Endpoint Security Strategy” eBook to enhance your security methodology.

5 Essential Elements of a Comprehensive Endpoint Security Strategy

Read our new “Five Essential Elements of a Comprehensive Endpoint Security Strategy” eBook to enhance your security methodology.

Load More