Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

White Paper | Presented by Presidio

IBM Power AC922 Server_ The Best Server for Enterprise AI

As AI initiatives shift from backroom experiments to boardroom imperatives, many organizations find their existing infrastructure ill-suited to help them make the journey.

White Paper | Presented by Presidio

IBM PowerAI Enterprise- Enterprise AI workloads at massive scale

Across many industries and professions, the data explosion is outstripping the human capacity to understand the hidden insights.

White Paper | Presented by Presidio

Inovia AI Accelerates development of cutting-edge AI applications by a factor of 10

AI and big data developer Inovia AI wanted to offer its clients the latest and greatest in AI technology. But hosting its data-intensive training cycles on x86 servers meant they could take years to run.

White Paper | Presented by Microsoft

Office 365 + EMS better together

Digital transformation is fundamentally changing the way companies use technology to drive growth in innovation, Digital transformation is fundamentally changing the way companies use technology to drive growth in innovation, differentiation, engagement, and value. It’s also creating a new culture of work. As the workforce grows more diverse and mobile, it continues to shift away from routine tasks, instead relying on greater abilities to communicate, collaborate, and think critically and creatively.fferentiation, engagement, and value. It’s also creating a new culture of work. As the workforce grows more diverse and mobile, it continues to shift away from routine tasks, instead relying on greater abilities to communicate, collaborate, and think critically and creatively.

White Paper | Presented by Microsoft

Securing your competitive edge: cloud security advice for business leaders

As a business leader, pursuing digital transformation can help you gain deeper knowledge of customers, access to new markets, fresh ways for employees to work in collaborative teams, increased efficiency, and dramatically faster innovation.

Video/Webcast | Presented by Microsoft

Step up your enterprise security: 5 strategies for advanced cloud security

As an IT decision maker, you’re at the forefront of the technology changes that drive digital transformation—especially the adoption of cloud technology. With the right approach, you can enable deeper knowledge of customers, access to new markets, fresh ways for employees to work in collaborative teams, increased efficiency, and dramatically faster innovation.

The Total Economic Impact of the Flexera Data Platform

As the technology landscape evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. Learn how to gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk.

Video/Webcast | Presented by DataStax

5 Steps to an Awesome Apache Cassandra™ Data Model

Picking the right data model is the most critical step to ensuring you get the most out of your Apache Cassandra implementation.

White Paper | Presented by KnowBe4

2018 Phishing By Industry Benchmarking Report

In this report, brand-new research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training. Do you know how your organization compares to your peers of similar size? Download this whitepaper to find out!

Miscellaneous | Presented by KnowBe4

2018 US State of Cybercrime Survey Results

This exclusive look at the results from the CSO 2018 US State of Cybercrime survey, sponsored by KnowBe4, highlights key findings around the number of breaches, financial impact, and major causes of security events. Additional findings touch on the following topics: use of technology to mitigate risk, security budgets, top-down company commitment, the use of behavior monitoring technologies, and security awareness training.

Load More
Popular Resources