Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...

Miscellaneous | Presented by NowSecure

Closing the Mobile App Security and Privacy Gaps in Your Enterprise

The world around us has gone mobile. In just a decade, mobile app downloads grew from zero to 105 billion, and developers now outnumber security staff 100:1.

eBook | Presented by Box

GDPR Prep: 3 key questions for your cloud vendors

The GDPR is officially here and if you're like a lot of businesses, you're still not exactly sure what you need to do to comply. With fines of up to 20 million euros for failing to meet GDPR requirements, isn't it time you found out?

White Paper | Presented by Workfront

Successful Digital Transformation Requires Rethinking Work Management: IT Can Lead the Way

In this whitepaper, the reader will learn more about what solution can address managing enterprise work and how IT can—and should—lead the change. Also, find out more on the essential attributes of a modern work management platform, and the future of metrics, Artificial Intelligence, and machine learning to help businesses adopt modern platforms.

White Paper | Presented by Cylance

Threat Models and Methodologies

This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand.

White Paper | Presented by Cylance

Ransomware Remediation and Prevention

Ransomware is a form of extortionware that encrypts files in order to prevent victims from accessing their systems and data.

Video/Webcast | Presented by PerimeterX

Anatomy Of Magecart Attacks

Digital skimming is a known threat of the digital era. With the advent of online shopping requiring credit card info to be filled the digital scamming rates grew exponentially.

Digital Transformation for Your Business

Hybrid clouds need proper management and navigation. When done correctly, you can digitally transform your business with SAP HANA powered by HPE. Review this checklist to see if your business can benefit from HPE solutions for SAP HANA.

Video/Webcast | Presented by Unisys

Trusted Resilience with Data Recovery Security

Learn more about threat actors aiming to bring companies down.

White Paper | Presented by PerimeterX

Third-Party Code: The Hidden Risk of Your Website

Read the white paper to learn how you can manage risk from third-party code and better protect your applications.

Case Study | Presented by PerimeterX

Case Study "Crunchbase"

Crunchbase relies of PerimeterX to Block Bots and Optimize Customer Experience.

Load More