Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

3 Reasons IT Needs a New Approach for Third-Party Access to Sharepoint

Microsoft's SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint.

5 Reasons Enterprises Need a New Access Model

Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago - through VPNs, proxies, and remote desktops - but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.

Video/Webcast | Presented by ServiceNow

Best Practices for Addressing Vulnerabilities

Discover best practices for how to respond to new high-profile vulnerabilities.

Case Study: How 99tests Was Able to Easily and Securely Deliver a Crowd-Sourced Application

99tests offers a cloud-based, crowd-sourced testing platform where users can be anywhere in the world. Providing secure, simple, and convenient remote access was a key challenge. Read the case study to see how the Akamai helped 99tests provide simple, secure access to their application.

Case Study: How BitSight Solved Its Complex Remote Access Issues

BitSight relied on a key piece of software for business. As the number of software users grew, the complexity of deploying, managing, and maintaining a VPN infrastructure became a big, ongoing headache for IT. Read the case study to see how Akamai helped BitSight solve their access issues.

White Paper | Presented by ServiceNow

Forrester: Rules of Engagement

As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious actors. This report is a call to action for developing more automated threat response processes and a set of cyber rules of engagement.

How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and Other Public Clouds

The question of whether to transition enterprise applications to the cloud is a valid question in most organizations. Determining which applications should go and how to maintain control once they are there, however, is slowing down the journey to the cloud. Join us January 24th @ 10AM PDT/ 1PM EDT to learn how you can avoid the common mistakes and reduce risk in the transformation to cloud.

Video/Webcast | Presented by CatchPoint

I.T. Takes a Village: How Overstock Leverages Catchpoint & OpsGenie

Catchpoint and OpsGenie are two tools within the larger IT ecosystem that help many companies, especially ecommerce retailers, provide great customer experiences for their users. But with so many specialized tools out there, it's very important for these tools to be able to integrate and 'play nicely' with one another.

LIVE WEBCAST: Transform Your Organizational Security Culture

Successful digital transformation requires organizations to keep up with an unprecedented pace of change. Collaboration tools may help employees meet the challenge, but do workers understand the value of the information they are sharing, and more importantly, their role in protecting it?

Painless, Secure Third-Party Access

Companies use outside resources more than ever to stay competitive and it is essential that outside contractors and suppliers have access to specific enterprise applications to be productive. Yet, traditional access methods, such as VPNs, are cumbersome and put enterprises at risk. Read this solution brief to learn about a new painless, secure approach to remote access.

Load More