Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

eGuide | Presented by Red Hat

Red Hat Open Innovation Labs E-Book

Red Hat Open Innovation Labs is an immersive residency for modernizing application development. Developing applications can take years and cost millions, and security, compliance, and privacy requirements stall progress.

Video/Webcast | Presented by VMware

Solve Your Citrix Problems with VMware Technologies

Hear from the architect of VMware's Citrix migration & enhancement strategies explain how key VMware technologies such as Horizon, App Volumes, Instant Clone & NSX can help. We will dive deep on how to evaluate the state of the Citrix environment, assess project requirements & review real world scenarios. By the end of the session you will know all about the best-practices, tools & services available to ensure your project is a complete success.

eGuide | Presented by SelectHub

Top BI Analytics Tools - Definitive Pricing Guide 2018

Get an in-depth comparison of the costs and implementation models for the top BI tools for 2018. This practical guide reveals actual costs, product limitations and key competitors for the most popular business analytics solutions.

What to Look for When Evaluating A Password Management Solution

This guide will look at the many factors which, when combined, essentially mandate that all organizations, SMBs in particular, deploy and use the best password management solution for their unique needs.

White Paper | Presented by Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program.

White Paper | Presented by Bitsight

5 Ways Your Vendor Risk Management Program Leaves You In The Dark

Relationships with vendors are important (or even vital) for many organizations, but unfortunately, there's a trade-off - the more data you share, the more risk you acquire. Unfortunately, current risk assessment methods don't paint a complete picture, and they are often biased and insufficient when used alone. Within these pages, we're going to explore how VRM programs often leave you in the dark, and what you can do about it.

White Paper | Presented by Bitsight

A CIO's Guide for Reducing Security Anxiety

In this guide, we'll walk through the following: Why cybersecurity bench marking is difficult for the modern CIO, different methods of bench marking you may be involved in (or want to consider), how Security Ratings may solve many bench marking challenges. Download this free guide today so you can establish your bench marking plan

Case Study | Presented by Nuance

Bank Leumi transforms authentication with voice biometrics

The First Direct Bank of the Leumi Group, one of the largest banks in Israel, was challenged with the PIN and knowledge-based authentication process used in its contact centers. The verification questions took up to 30 seconds per call, frustrating customers and proving easily answered by imposters.

White Paper | Presented by Nuance

Biometric security boom

Download the "Biometric Security Boom" white paper to learn why leading organizations are turning to highly sophisticated and secure multi-modal biometric authentication technologies to provide customers with a dramatically better experience and realize major efficiency and security gains.

eGuide | Presented by Bitsight

Board-Level Reporting Survival Guide

This Survival Guide offers some advice on how to advance the CSO/CISO-board relationship, and provides some tips that CSO/ CISOs can use to make their seat at the table more secure-and more meaningful to the business.

Load More