Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Illumio

Decoupling Security from the Network: The Evolution of Segmentation

Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption.

White Paper | Presented by Illumio

How to Build a Micro-Segmentation Strategy

Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments.

White Paper | Presented by Box

How LOB leaders turn content into a business advantage

As disruption and hypercompetition take hold across virtually every industry, you can’t be “good enough” and just keep up; nearly half of the S&P 500 will disappear over the next decade*.

White Paper | Presented by CBTS

CIO’s Guide to Collaboration: Deliver a Consistent UX Without Sacrificing Security

Modern business takes place on all kinds of devices, among users who need to securely connect and innovate from a hotel room as easily as from an office.

White Paper | Presented by Ensono

Mainframes. Anomaly or Workhorse

Amid considerable change to infrastructure, there are many companies continuing to depend on and invest in their mainframe estate.

White Paper | Presented by Ensono

Old Workhorse for New Tech- Mainframe in the age of cloud, AI and blockchain

Analyzing its growing impact on mainframe in today’s transformation strategies.

White Paper | Presented by Snow Software

Supporting Cybersecurity & Privacy Standards with ITAM

How can IT asset management help you navigate the changing threat landscape, strengthen your security posture and enhance your current security stack?

White Paper | Presented by ReliaQuest

Rethinking Security Automation: Six Best Practices to Improve Visibility & Accelerate Response

The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand – all of which add up to less visibility into threats and less efficient security teams. Automation is supposed to solve the “tool fatigue” problem, surfacing the most critical issues by running playbooks against common threats and freeing up valuable resources for other tasks. However, expectations for automation have outpaced its capabilities to drastically reduce human intervention in security monitoring.

White Paper | Presented by Workfront

Successful Digital Transformation Requires Rethinking Work Management: IT Can Lead the Way

In this whitepaper, the reader will learn more about what solution can address managing enterprise work and how IT can—and should—lead the change. Also, find out more on the essential attributes of a modern work management platform, and the future of metrics, Artificial Intelligence, and machine learning to help businesses adopt modern platforms.

White Paper | Presented by Cylance

Threat Models and Methodologies

This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand.

Load More