Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Rubrik & AWS

Castilleja School Automates Data Protection and Shortens RTOs

Castilleja School, an independent school for girls, used offsite tape backup to protect its data and prevent disruptions to its learning environment. After years of time-consuming manual work involved with tape backup and difficulties in recovering its files quickly, Castilleja School replaced its existing system with Rubrik Cloud Data Management to automate backup to Amazon Web Services (AWS). Rubrik helped Castilleja establish a hands-off solution that enhanced its ability to backup and recover its academic and financial records quickly. In this webinar, learn how Castilleja School uses AWS and Rubrik to simplify data protection, reduce management time, lower its total cost of ownership (TCO), and shorten its recovery time objectives (RTOs). When: June 14, 2018 | 8 am PDT/11 am EDT

Contextual access to apps and data anywhere, any time, on any device

Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we’ll show you how.

Maintain control of documents and files you share with others

It's something we do all the time. Sending a file to someone else, sharing data. But what happens when you press send on that email? The file attachment is gone and out of of your control. You have no idea where it could end up, or who could access it. That's where Citrix ShareFile can help. Watch this video and we’ll show you how.

Video/Webcast | Presented by KnowBe4

On-Demand Webinar: Phishing Attack Landscape and Industry Benchmarking

One of your important and ongoing IT security initiatives is getting the Phish-prone percentage of your users as low as possible. But how are you doing compared to the "similar-size peers" in your industry?

Video/Webcast | Presented by KnowBe4

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Get a jump start on the year ahead in cybercrime. Join security expert and CEO at KnowBe4, Stu Sjouwerman, for this 30-minute webinar "Phishing and Social Engineering in 2018: Is the Worst Yet to Come?". Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

Video/Webcast | Presented by KnowBe4

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Get a jump start on the year ahead in cybercrime. Join security expert and CEO at KnowBe4, Stu Sjouwerman, for this 30-minute webinar "Phishing and Social Engineering in 2018: Is the Worst Yet to Come?". Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

Recover from malware and ransomware

Cybersecurity - it's top of mind for every organization. When it comes to providing SECURE access to desktops, applications and data Citrix can help. Watch this video and we'll show you how.

Securely deliver apps and desktops to any enterprise, from any cloud

How do you securely deliver applications, data, and desktops to workers, without putting your intellectual property at risk? Can you leverage cloud resources like Office 365 and Azure AD? Absolutely. And Citrix brings it all together, with security being top of mind. Watch this video and we’ll show you how.

Accelerating Artificial Intelligence: Best Practices for Deep Learning Architectures

Define the challenges & best practices in designing infrastructure solutions for artificial intelligence, deep learning & machine learning.

NCC Media Chooses Dell EMC Isilon and Hortonworks Data Platform for Their Data Lake

With analytics based on Dell EMC Isilon, NCC Media extends advertising that provide greater value and drive deeper insights

Load More