Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by LogRhythm

A Framework to Surface Cyber Threats via Security Intelligence

The Security Intelligence Maturity Model™ (SIMM) provides a systematic guide for an organization to assess and actively achieve a heightened security posture. Find out where your organization sits on the SIMM and identify gaps that need to be filled.

White Paper | Presented by LogRhythm

Magic Quadrant for Security Information and Event Management

LogRhythm positioned in leaders quadrant of Gartner's 2014 SIEM Magic Quadrant Report for the 3rd consecutive year. The Magic Quadrant is a yearly analysis of the SIEM market that examines market driving innovations & compares leading competitors.

White Paper | Presented by LogRhythm

Understanding the Advanced Persistent Threat

Due to the difficulty of detection, APTs are a growing concern in the security industry. Traditional security tools must be combined with Security Intelligence to properly detect and respond to APTs.

Video/Webcast | Presented by HP

Data-Centric Security & Encryption: Keeping Your Critical Data Safe

Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.

Video/Webcast | Presented by HP

Incident Response - What Is (and Isn't) Working Today

This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.

White Paper | Presented by IBM

7 Reasons You Need Predictive Analytics Today

Learn why advanced analytics tools are essential to sustain a competitive advantage.

White Paper | Presented by Dell | Eaton

Batteries - the heart of your UPS

Before the days of sealed, maintenance-free batteries, you could check the battery's electrolyte with a hydrometer to determine its ability to retain a charge.

eBook | Presented by Kaspersky Lab, Inc.

Debunking the Top 5 Security Implementation Myths

Even if they know their companies' current security solution isn't effective, many IT managers are under the false impression that it's simply too complicated, costly and time consuming to make a change.

White Paper | Presented by IBM

Infographic: Predictive Analytics Provides FP&A Advanced Capabilities

View this infographic to compare metrics and results from organizations that utilize advanced analytics in their financial planning and forecasting and the percentage in their confidence in creating a more reliable view of their outcomes.

White Paper | Presented by Dell | Eaton

Intelligent Power Management: Strategic Key to Optimized Virtualization

Looking for the best way to extend and enhance the benefits of virtualization? The answer could be hiding in plain sight in your data center - power management.

Load More